Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 05:39
Behavioral task
behavioral1
Sample
a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe
-
Size
580KB
-
MD5
a9cb000d86d62c0d7037d21547bdfeb3
-
SHA1
d7e2a2fc73e574b845348d11f4774fd7a21cec4d
-
SHA256
d193bccf9923367bf0e9e42b487e4e4da8e94cbcaf03f63c99be126ebfa04dc0
-
SHA512
86c6e701107ba74aa3d0433d88fc4102b229798c1c8a4cbea4962a4f81bb1fd4fe193f703e25adceabd9268a174d9433ce83d12679ecc658996a4e44811f1a5e
-
SSDEEP
12288:JIP6DbtsmX9LXctjxk0Ptejje/l+1hBSDblgUTFafQ:JIPOpsmX2jW0PUvVWgaFafQ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3016-0-0x0000000000400000-0x00000000005A9000-memory.dmp vmprotect behavioral2/memory/3016-2-0x0000000000400000-0x00000000005A9000-memory.dmp vmprotect behavioral2/memory/3016-6-0x0000000000400000-0x00000000005A9000-memory.dmp vmprotect behavioral2/memory/3016-10-0x0000000000400000-0x00000000005A9000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3016 a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe 3016 a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe 3016 a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe 3016 a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3016 a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe 3016 a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe 3016 a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe 3016 a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9cb000d86d62c0d7037d21547bdfeb3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3016