Analysis
-
max time kernel
22s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
b53fd21f2df4205ca4dff958c3c888d8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b53fd21f2df4205ca4dff958c3c888d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b53fd21f2df4205ca4dff958c3c888d8_JaffaCakes118.exe
-
Size
64KB
-
MD5
b53fd21f2df4205ca4dff958c3c888d8
-
SHA1
426040b60c5c42315a2594cfe571f707aa5811dd
-
SHA256
f01b56e67f8eb6030757a90cb7dcd0c4d6059fba5b834baa9299f8419715fee7
-
SHA512
b8b15e925c0f594443ae395df3b4b36d99b19c1e14c971a85353f9f77682e63ef9bdf5ffba08fd64e152a7597ba83f7a6e68afc9eac71a2ab7a501dd1332e1a2
-
SSDEEP
768:rYXKqjLOr/rIILdyH9XV46rOlMnJbl2jRug0DGNkqtOuewuzgqaDUpMzEeVgtFqZ:reK8WdyHxJOMiRuKQuesP0cwe
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b53fd21f2df4205ca4dff958c3c888d8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b53fd21f2df4205ca4dff958c3c888d8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2928 b53fd21f2df4205ca4dff958c3c888d8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b53fd21f2df4205ca4dff958c3c888d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b53fd21f2df4205ca4dff958c3c888d8_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2928