Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe
-
Size
92KB
-
MD5
b02e0ccf68ecc70cc30a7c3a46523dbc
-
SHA1
d514e49aee220172d0e5b5bcec4f8af1504106b0
-
SHA256
5ccdccde31fa9af0fecacca8d97a14f57355ecf0f14fbf439a34f25081c4b07d
-
SHA512
d626cfd8097eebf8fb17f50306207b954d4cdfc5e480c925a65002130a4ac7b84d6e8fef8c4971af7ef978e966dcf9c7fb593459179dea9f53190dcfb6f19f48
-
SSDEEP
1536:qOk4aouX1AzbCqHidso2KLwNoFBU9S8dX8DuFIfjIi8MAV:qxrouCbCqHid9L5U9S8dX8eMIsAV
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sUvrTqasuikk b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\msagent\remony.lo b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe File created C:\Windows\remony.ico b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe File opened for modification C:\Windows\hh.log b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe File created C:\Windows\msagent\remony.exe b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4668 b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b02e0ccf68ecc70cc30a7c3a46523dbc_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD5edb18a436af138c44b37cf482817e1e3
SHA11e51b9eb7846656e13221d67af610ceeed9e04de
SHA25609a42b4a7b73978089ee295c929866555f0ac5c386947f26db4203fd5b4a4baa
SHA5126873bc50c05b31d0235085b976d2eec9b75481e9b7e747c2eb1d69c7fda445d22f770083c7a0a867569dd77ac13ca6dee40bd995751560a3bcf3c21d688d75dd