Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 12:09
Static task
static1
Behavioral task
behavioral1
Sample
bbab17a628fd0741c7c1e587eb1c1e53_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bbab17a628fd0741c7c1e587eb1c1e53_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bbab17a628fd0741c7c1e587eb1c1e53_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
bbab17a628fd0741c7c1e587eb1c1e53
-
SHA1
a517b51bf2220b84ba85e0b10f1cd7ce6120d68f
-
SHA256
8f0183785e72fc8f8f42076aff152d7156dfa1b5fa091a9e9e67b1f18bf340ee
-
SHA512
0c600d45c431ce4ceb1fc9fc57c3cc4e740856deb4b6f804c422a4407ed73a30620b735682421e2f592b5f9247cedd01cb3e65f46bfd251435914feb70d2d2f4
-
SSDEEP
24576:BJSuurpey89qPQbZP8XJ4vF9+TBl+NMkZwr26jNLeeCl:B+9ZJYbNkNBlKhn1l
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbab17a628fd0741c7c1e587eb1c1e53_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 bbab17a628fd0741c7c1e587eb1c1e53_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2392 bbab17a628fd0741c7c1e587eb1c1e53_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbab17a628fd0741c7c1e587eb1c1e53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bbab17a628fd0741c7c1e587eb1c1e53_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2392