Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe
-
Size
80KB
-
MD5
aba56644554d3ebad65f3172796477a7
-
SHA1
e44e36f0a1d03fc55395b60c20f9c6abe75f56aa
-
SHA256
0fe0afb14925acdbad3823734a0904311c51e64306c2cbfe294a2a7da2826b7c
-
SHA512
c55d541a5661e302e44ee500baca73f5a0d0a270a4806eb72660269dfa2d577ff43d5e2edc49ebda7e0aadfb069f3ca37046a17e351e31c9e802a41c430c2b39
-
SSDEEP
1536:Z0bBkIaAfTlFD5mGMV5+lbtZ8m5pY4uMzdy/ESI6p0QsO6iZe5znjjwrnAS0v:Z0ffTlFVJFbtZt5uvmM/D0JNfjwrV0v
Malware Config
Signatures
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\QL3.exe aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe File opened for modification C:\WINDOWS\QL3.exe aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe File created C:\WINDOWS\QL32RPXOCQRF.dll aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2272 aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe 2272 aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2272 aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe 2272 aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aba56644554d3ebad65f3172796477a7_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2272