Analysis
-
max time kernel
135s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 18:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe
Resource
win7-20240705-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe
-
Size
3KB
-
MD5
b8965c3ab59e64a99d4d6301b5721669
-
SHA1
0ebf6a69b8978a610969e654db103cfdd6ac7741
-
SHA256
4aa4c86e97e37e2cb9228bf3ed441c381cc1e5357bfa3fd33555b438aa2cb29d
-
SHA512
f4bd433eaed80fc6d431010245cc10e2a885f65b3b1b6ed0756a6ef7b374b8a188fdb8e4d565bada0a3b305d1b11a90d66f82785ca6747e232127b7e01e7d616
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LUOM = "C:\\Windows\\system32\\DLD.exe" b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3644 b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8965c3ab59e64a99d4d6301b5721669_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3644