Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe
-
Size
76KB
-
MD5
bc1f8d204a60e77203617ae26f043629
-
SHA1
5ab85ceaf78ea13a760db95c528723b43b299716
-
SHA256
e92bfe06fd612cf61d3641cf684e9e4aaa0546218ccfafdc6e7372380d3a214a
-
SHA512
e9fd2c04a1764d23a0bc0a7076524af55309a90661f9a43d09d1cd85a2a98c213d9118a874ef1cbdb723dbef609e6087c246e8268d37bc22ec560ec0ee9df8fe
-
SSDEEP
768:0HlP/cnVP+M6rVyXe5KgUvZJ0g/xDaiAaPlcnVP+:0FPnMztwSD9PR
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\N: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\Q: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\R: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\T: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\L: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\M: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\O: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\S: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\E: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\G: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\H: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\I: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\Z: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\W: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\Y: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\A: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\K: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\P: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\V: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\B: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\J: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe File opened (read-only) \??\X: bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2452 bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc1f8d204a60e77203617ae26f043629_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2452