Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 07:45
Behavioral task
behavioral1
Sample
b6dddc99cba4892fdeb4992a796f177e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b6dddc99cba4892fdeb4992a796f177e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6dddc99cba4892fdeb4992a796f177e_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
b6dddc99cba4892fdeb4992a796f177e
-
SHA1
681a3d48c2e3ef6673d6303ce69522d8b71a1e41
-
SHA256
115e480c1572dac4a51ac8fcba7f0408481a0ff6c02a1f89b8d806d56010c8ea
-
SHA512
099610f9690f50bb9dc4bc6dd01db916d41497e6be96ea557d2ae2dbe976301afd0a6df917049ac24c9098821d3d76c34aed61a5f5e806a048da829baac9b5db
-
SSDEEP
24576:nPfHWZCdM4mDv/7znIGYmAqmPO367nr/bH4urYBV6t3zMlKmSFkxCpsu5OAUDO:P/GCiFv/Orm3g3YLctglcOxCpsu56S
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2688-6-0x0000000000400000-0x0000000000676000-memory.dmp themida behavioral1/memory/2688-5-0x0000000000400000-0x0000000000676000-memory.dmp themida behavioral1/memory/2688-7-0x0000000000400000-0x0000000000676000-memory.dmp themida -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6dddc99cba4892fdeb4992a796f177e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2688 b6dddc99cba4892fdeb4992a796f177e_JaffaCakes118.exe 2688 b6dddc99cba4892fdeb4992a796f177e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2688 b6dddc99cba4892fdeb4992a796f177e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6dddc99cba4892fdeb4992a796f177e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6dddc99cba4892fdeb4992a796f177e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2688