Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe
-
Size
203KB
-
MD5
b50cec8fef0a06edab624ee4c59f5339
-
SHA1
aaaac37d052936efb69c7314b678c717054695f3
-
SHA256
192c21c81e7045fe9c2f344cc9073caba8b99ae9bafc2013675f61b61775ca6f
-
SHA512
b0e600093598d69d9de226ed300b75f57ff7d76cab64f137b7d67ffcfad412bd72da16e22e6d513ff9ff115edac5ac5c1d7311ecee22067153c126bc7b30d47a
-
SSDEEP
3072:CknsNCssHX3snfKUuJ++URGUnSp0xkjP4YIpE1hg51qeAsaTA+6WSm4+i8rOR:CknOTI0RG6SKxo2JfqeAhTA+644Tp
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2252 set thread context of 2784 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 31 PID 2784 set thread context of 2768 2784 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2768 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 2768 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 2784 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2784 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2784 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2784 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2784 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2784 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2784 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2784 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2784 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2784 2252 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2768 2784 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 32 PID 2784 wrote to memory of 2768 2784 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 32 PID 2784 wrote to memory of 2768 2784 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 32 PID 2784 wrote to memory of 2768 2784 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 32 PID 2784 wrote to memory of 2768 2784 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 32 PID 2784 wrote to memory of 2768 2784 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 32 PID 2784 wrote to memory of 2768 2784 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 32 PID 2784 wrote to memory of 2768 2784 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 32 PID 2768 wrote to memory of 1204 2768 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 21 PID 2768 wrote to memory of 1204 2768 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 21 PID 2768 wrote to memory of 1204 2768 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 21 PID 2768 wrote to memory of 1204 2768 b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe"2⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b50cec8fef0a06edab624ee4c59f5339_JaffaCakes118.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768
-
-
-