Overview
overview
3Static
static
3aa738f0059...18.exe
windows7-x64
3aa738f0059...18.exe
windows10-2004-x64
3$TEMP/Wind...ng.cmd
windows7-x64
1$TEMP/Wind...ng.cmd
windows10-2004-x64
1$TEMP/Wind...ct.exe
windows7-x64
1$TEMP/Wind...ct.exe
windows10-2004-x64
1$TEMP/Wind...ct.exe
windows7-x64
3$TEMP/Wind...ct.exe
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
aa738f00595f5fec5a31c41b0b218d2b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa738f00595f5fec5a31c41b0b218d2b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/Window~1/Windows Aktivierung.cmd
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$TEMP/Window~1/Windows Aktivierung.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/Window~1/bin/bootsect.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$TEMP/Window~1/bin/bootsect.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/Window~1/bin/x86/bootsect.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$TEMP/Window~1/bin/x86/bootsect.exe
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/Window~1/bin/x86/bootsect.exe
-
Size
95KB
-
MD5
d8b8d28830226e96a800584c6a9db9e1
-
SHA1
b0cb47eee3667c8c24408927e952015c2081501e
-
SHA256
0025583cd9657d16e661c14c104ce904ed60d38b60422a623664e4241a5e50a0
-
SHA512
49574a97df915a854123f8eeddfba4312b716395eaa3f2bcfeb40c29fc2f140bf32cf610d98d9bfb9ad9bb9cda087eb06246d9765b232e30069ff90a38287797
-
SSDEEP
1536:5YbyrIO05nZX+SQleQKdsN+jiy9WElg3htJjR:vIB5B5ueQKdsN+jiynlg3zb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootsect.exe