Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 09:13
Behavioral task
behavioral1
Sample
b2e4bba6987023d19a2edd1bd5171ec4_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b2e4bba6987023d19a2edd1bd5171ec4_JaffaCakes118.exe
-
Size
446KB
-
MD5
b2e4bba6987023d19a2edd1bd5171ec4
-
SHA1
f07385d5e9ff0f0c003eb4408ddf513895c83952
-
SHA256
a01e054ed975802925a72a6036e35b7e5104bd03f55c01b98eb47b7a6e81d4e1
-
SHA512
5faac529aeb1fd7c216ad5529951b434fa49ae8bb2e757af2da413ebb64daf85eeb0d833461a0fe673e86c46dfd0b8c096a534273fe57478647af7fa83e8ac44
-
SSDEEP
6144:GAMuWvSQevdWlGZJY/NYeNjQ2E1490q8OAoQO1xSnfChhpj7X71b2YtXRicN:HWKQ0dWRQ2D9jpxxkfUnj/thtXRx
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest b2e4bba6987023d19a2edd1bd5171ec4_JaffaCakes118.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts b2e4bba6987023d19a2edd1bd5171ec4_JaffaCakes118.exe File created C:\Windows\system32\drivers\etc\hosts b2e4bba6987023d19a2edd1bd5171ec4_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2316-1-0x0000000000E80000-0x0000000000F2F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2e4bba6987023d19a2edd1bd5171ec4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2316 b2e4bba6987023d19a2edd1bd5171ec4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2e4bba6987023d19a2edd1bd5171ec4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2e4bba6987023d19a2edd1bd5171ec4_JaffaCakes118.exe"1⤵
- Enumerates VirtualBox registry keys
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2316