Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe
-
Size
204KB
-
MD5
b5eaaae2ebc1197e9c9b05c333820025
-
SHA1
2ce1dd4085c0d0a747eab6020e6acacf773269d6
-
SHA256
8ce8be6a3db48d93434e56e795a7a1f99366874d97da6af7d246d2d76a6f3b65
-
SHA512
e56d5b8b1bbdfdfcd692dc627251ac395e0149b21db1781acddd6fd3da596195ce9120166051355563caaf764b14c4e646fbb7dc82d4b0fc791528380aa14eb8
-
SSDEEP
6144:NXXZoqlXIOTIYwzIKYEQsKKyCCBRwK2xFG4PDcb+w97U15QqCPmtRqYqIrKiL0hY:RjlY0zeIKY0KKyCCBRwK2xFG4PDcbV9o
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\wucrtupd.exe b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe File opened for modification C:\Windows\no_a_la_LSSICE.txt b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe File opened for modification C:\Windows\lssice_info.txt b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe File opened for modification C:\Windows\i-worm_info.txt b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4120 b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b5eaaae2ebc1197e9c9b05c333820025_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4120