Analysis
-
max time kernel
132s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 13:48
Behavioral task
behavioral1
Sample
b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe
-
Size
197KB
-
MD5
b7e0879ec2d70cbb522d7f98fd87c53f
-
SHA1
0aa641a437bfb169d6343fc0ca60a2dda2e04e8c
-
SHA256
236557f1ef6049a47038ce9881fa61d87b551bf3ef9d29f43033ecad5ea46ac9
-
SHA512
b8d72ac8b64ef95349d2eb589f88d10cb52d1b12594e9fa378ba51ff90190be2ca49b6887c3275ae5a42e893d9a356e3af5d6994b52780353226bcb09d6eb007
-
SSDEEP
3072:T+cWKi2x+Vx6aZSokrTT9jyTNSWAE21JsvbofAhljerD5Erb1L23cLba:T1WKaUMipjccE7zo4Fu5Erb18cLO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1760-0-0x0000000000400000-0x0000000000451000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1760 b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1760 wrote to memory of 3628 1760 b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe 84 PID 1760 wrote to memory of 3628 1760 b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe 84 PID 1760 wrote to memory of 3628 1760 b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe 84 PID 1760 wrote to memory of 3628 1760 b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe 84 PID 1760 wrote to memory of 3628 1760 b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7e0879ec2d70cbb522d7f98fd87c53f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3628
-