Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
af4b7df35c9825044b77170b73ea9a4c
-
SHA1
e9aad740574372f497fe4160bff9e496f1792132
-
SHA256
aa2e8c8dee963d420a86b45684bd89486b2146de10547e0071a91cb649169a16
-
SHA512
a8523e2673846bf34baca8cd4c8a9bb714232af52e0cd58df92f617c104e0a54b43577a27391341b7d2d2809cba414a347cd472afd9f7a4caffbc099cde00667
-
SSDEEP
49152:0wWK5OvLjD1QtHmNVzeQoQhFqGGspNb7n/LXE4S:0BK5YD1QtwzPFqYTLXzS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2616 af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe 2616 af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe 2616 af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe 2616 af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\af4b7df35c9825044b77170b73ea9a4c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616