Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe
-
Size
42KB
-
MD5
ad3cfbd1082f3e7b5bbb40cb5ec231b1
-
SHA1
9ce453bdb7c792636ae4dc7e0c0f33cb51e2e57b
-
SHA256
818a5b4c6f3b6c8e8b1ad39a672c87daf9e110cfe69c305e9467808f08b8251f
-
SHA512
aac65b573d8f122779e2fd808a69441d607a1368e7e1d7bb0ade7436752f56f26df624a1c6ac923b748cd2523fac421b53daf97b5a691e3ccc66ceb16bf756a1
-
SSDEEP
768:wiDFdyr+I16et/sZIzx7Mj29fNgKXecfcrxRD5C0rjFB2hpUm2XEh:tDOrdom/sZI+jONgpcfcrxRDJrJUhpFh
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2340 set thread context of 2240 2340 ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2340 ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2240 2340 ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2240 2340 ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2240 2340 ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2240 2340 ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2240 2340 ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2240 2340 ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2240 2340 ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2240 2340 ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ad3cfbd1082f3e7b5bbb40cb5ec231b1_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
PID:2240
-