Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe
-
Size
358KB
-
MD5
a71c8d0f3b76d7faa8d12aea50a0a5db
-
SHA1
452a0c7f6b9da9fb6243ae7e5be8bd993d2a8018
-
SHA256
5e61ee83b201f01a5c15acc97b2d3402f769c9d0d65df19e562acd2f74ba3711
-
SHA512
0fa1fa40939c0f66378205501ed7977f95a67bdc69d76cf4052e09acbd24a85048ff7e9b6a27467b92949121f5ddb9c9a89c0251d278a66a4294360c28f8c3e6
-
SSDEEP
6144:xDnzwMPKotBRuFq/4Y0OQ6iQHWSRpjvpyoWlRlDqDjl4AFyO7QB79VulTweZZ0:aEPBR5/4r6ifSRPFWlRl2t4AyiQpA8eU
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1036 set thread context of 4536 1036 a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1036 wrote to memory of 4536 1036 a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe 89 PID 1036 wrote to memory of 4536 1036 a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe 89 PID 1036 wrote to memory of 4536 1036 a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe 89 PID 1036 wrote to memory of 4536 1036 a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe 89 PID 1036 wrote to memory of 4536 1036 a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe 89 PID 1036 wrote to memory of 4536 1036 a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe 89 PID 1036 wrote to memory of 4536 1036 a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe 89 PID 1036 wrote to memory of 4536 1036 a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe"2⤵PID:4536
-