Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 01:31
Behavioral task
behavioral1
Sample
ad61c75bbe01c9ee9b58a9e5790e3248_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad61c75bbe01c9ee9b58a9e5790e3248_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad61c75bbe01c9ee9b58a9e5790e3248_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
ad61c75bbe01c9ee9b58a9e5790e3248
-
SHA1
8b74f8d24d71789a9b6c922a34cb8c715c871d86
-
SHA256
c1485f9ff73c4e93d19e85d26ad5580546068cc5bc051d57254fcedfcf0b7269
-
SHA512
e260cbc6039504711cfd1f2f864ee9630cd879dcc6d5cfbad150f83496a843c5f2e612a9025f197bc0cdf2e2e65beb661c555d7248a3c9afea27804ff6d4a758
-
SSDEEP
24576:18/knXLv4kp6m8Fyg29V4Uprv/1UujF/Pdb8kJEB0eQAkSwVCuF+rLk:fXLv4kpp11e6r31P1r+CEkMJrLk
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad61c75bbe01c9ee9b58a9e5790e3248_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4712 ad61c75bbe01c9ee9b58a9e5790e3248_JaffaCakes118.exe 4712 ad61c75bbe01c9ee9b58a9e5790e3248_JaffaCakes118.exe