Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
b332afc941141d6ea03b5f9813c5ae48_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b332afc941141d6ea03b5f9813c5ae48_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b332afc941141d6ea03b5f9813c5ae48_JaffaCakes118.exe
-
Size
504KB
-
MD5
b332afc941141d6ea03b5f9813c5ae48
-
SHA1
d559faf8200bb05279296caddecec7d8f0f05c01
-
SHA256
855f730cef088fc775bb6d8efed8e4f7d7de139eb78960a86c72a80f3d958553
-
SHA512
9c666f3eb5346501a530ef017c3bd111e067df4c31e637177f25358a695c53f0bcb6c2d97ca110ce4eedff396d35b80b8a535d7a95357b9d5d3d2f6b122a0618
-
SSDEEP
12288:4hHxA0WzY3C+io6jyp8GN3ktMU+38Oef30405Vb:+q0iBoqyCI2QKf9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b332afc941141d6ea03b5f9813c5ae48_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b332afc941141d6ea03b5f9813c5ae48_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz b332afc941141d6ea03b5f9813c5ae48_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2652 b332afc941141d6ea03b5f9813c5ae48_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 b332afc941141d6ea03b5f9813c5ae48_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b332afc941141d6ea03b5f9813c5ae48_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b332afc941141d6ea03b5f9813c5ae48_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2652