Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 18:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b4904f438e5681e383a56e574124bf5a_JaffaCakes118.exe
Resource
win7-20240729-en
windows7-x64
3 signatures
150 seconds
General
-
Target
b4904f438e5681e383a56e574124bf5a_JaffaCakes118.exe
-
Size
78KB
-
MD5
b4904f438e5681e383a56e574124bf5a
-
SHA1
021200d2bb987f4c18e808e96d409272fe374ab6
-
SHA256
29c218fb4207096c67cc6a709b7a89ed50a79291a1714d00b9da33f74dc08902
-
SHA512
44e8dd5d7ac4d915746d8d5bc5f93b81decd756354b5408307c13bb47310944682db4c610cc0b1016ec1a8286bf17b68485ecd7aa3bd6a9ca0e1f3048026bedc
-
SSDEEP
1536:gnr+2GaAlB4YPzxRbULXwvwolSrfjymlfjN5V8m4I/qjkxq+S7jZc:gnr+2GaY4OzxRbULXwvgrfjLJ9SwxjSG
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications b4904f438e5681e383a56e574124bf5a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Internet Explorer\IEXPLORE.EXE = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE:*:Enabled:Internet Explorer" b4904f438e5681e383a56e574124bf5a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List b4904f438e5681e383a56e574124bf5a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile b4904f438e5681e383a56e574124bf5a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4904f438e5681e383a56e574124bf5a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2820 b4904f438e5681e383a56e574124bf5a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4904f438e5681e383a56e574124bf5a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4904f438e5681e383a56e574124bf5a_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2820