Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 18:01
Behavioral task
behavioral1
Sample
b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe
Resource
win7-20240704-en
7 signatures
150 seconds
General
-
Target
b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe
-
Size
654KB
-
MD5
b896a117663d409732487ea51a7fb2f1
-
SHA1
feae5cb29d35d9cc2404f2ac75c438e34bae4883
-
SHA256
a53563c272155d20356b229040bb04e8a6b5ac4df5a71ee5688bcca7b10a0479
-
SHA512
cd70811cdbb4c2fd44f899fe76847fd5b1b6202516005081024824a33832335400c9c1355813756923f44387873eaf15e3fcd2a24c1898b8423f9831dddd994f
-
SSDEEP
12288:UVPkWX99rdNI2NoAxKGnX+PI2Rgsnv1rwJv0NeMe6kNkZCgCj7XfJAMoS:Fu02/ndNuNdkNkqLJ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5200-0-0x0000000000400000-0x00000000005A9000-memory.dmp upx behavioral2/memory/5200-15-0x0000000000400000-0x00000000005A9000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5200 b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe 5200 b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5200 b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 5200 b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5200 b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe 5200 b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe 5200 b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe 5200 b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b896a117663d409732487ea51a7fb2f1_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5200