Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe
-
Size
31KB
-
MD5
ae84a0c673596416c6d0a7b41b72e584
-
SHA1
2bb3693b29fd6d871408f35f2cab2ff2483eedde
-
SHA256
c5430c410fc841b59289b9eb8e79d39b907c895d54aad09e130ac83e53a38596
-
SHA512
32ca0e6273196ad093f0ac2f3d4590718362b97f048e6cc7c7d180ea7be9d6f0f8d3ab5538efc5349c92b6b646590e0042762e5cf77ef27a6537c1c33b24ce09
-
SSDEEP
768:zIPfXOhlKoLxtCt74y/842kGim5admgS0CX0M7:4CKoLD+h/84UimkdxM7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2736 ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe 2736 ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe 2736 ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe 2736 ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3568 2736 ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe 56 PID 2736 wrote to memory of 3568 2736 ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe 56 PID 2736 wrote to memory of 3568 2736 ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe 56 PID 2736 wrote to memory of 3568 2736 ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae84a0c673596416c6d0a7b41b72e584_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3884,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:81⤵PID:880