Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe
-
Size
85KB
-
MD5
b75994e3b5d57ac98c5adbbf7f4f9fb6
-
SHA1
3b02fe8f6d47302c5a0f0817407b867257190a98
-
SHA256
b79c23f47c319c618a618f564abe1575420b00b14d1bb4deea850284d7efca65
-
SHA512
87dd5a7e809246cea8658c0fc7ba552f6fac6fe47e9c5f91c4fa03d6ff61e328291551694a461c9f4ba79632abed3346a8be6561abb625b7e8797bac068b48da
-
SSDEEP
1536:bBYB2B20xIeAp6M/z92UCjuZPeJzkhKIvTL/3TpwGCrilN5WVNLTDE:9rKe86MwjWPDhKQTLaGX5IhTY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4040 b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4040 wrote to memory of 3788 4040 b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe 85 PID 4040 wrote to memory of 3788 4040 b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe 85 PID 4040 wrote to memory of 3788 4040 b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe 85 PID 4040 wrote to memory of 3788 4040 b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe 85 PID 4040 wrote to memory of 3788 4040 b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b75994e3b5d57ac98c5adbbf7f4f9fb6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3788
-