Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 20:55
Behavioral task
behavioral1
Sample
bd1f01a629debc3269c8bb04f7493b46_JaffaCakes118.exe
Resource
win7-20240704-en
2 signatures
150 seconds
General
-
Target
bd1f01a629debc3269c8bb04f7493b46_JaffaCakes118.exe
-
Size
504KB
-
MD5
bd1f01a629debc3269c8bb04f7493b46
-
SHA1
9b006d50f7b556a55afcd7263bfd12de1c689866
-
SHA256
35697c677a405eab7a5e5c8e093811f028edfdd90a2038cc5250ddca21385d12
-
SHA512
12a1ec8c1664c7b377572ef45f758a52b0e00050b105b777d27b509a7ec060f9c7e5ad7d3d290735c3c7ef4417766091087acb1004a78f93316a38abf4b6d311
-
SSDEEP
6144:nAXDX6dmCsRQRroDWzwvExndCprrPxr5bZe1dO4V7Zf6fkcY9gmhGuvB1OOb7Q:Kc8DWMcxdUrlr9ZI7Fqqgm4w7Q
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4972-0-0x0000000000400000-0x0000000000511000-memory.dmp vmprotect behavioral2/memory/4972-2-0x0000000000400000-0x0000000000511000-memory.dmp vmprotect behavioral2/memory/4972-9-0x0000000000400000-0x0000000000511000-memory.dmp vmprotect behavioral2/memory/4972-8-0x0000000000400000-0x0000000000511000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4972 bd1f01a629debc3269c8bb04f7493b46_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd1f01a629debc3269c8bb04f7493b46_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd1f01a629debc3269c8bb04f7493b46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd1f01a629debc3269c8bb04f7493b46_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1296,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:81⤵PID:3296