Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
bdd16d42f20e858c8fc313a709f1f4de_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bdd16d42f20e858c8fc313a709f1f4de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bdd16d42f20e858c8fc313a709f1f4de_JaffaCakes118.exe
-
Size
318KB
-
MD5
bdd16d42f20e858c8fc313a709f1f4de
-
SHA1
d2e9b942031edd7110fbd436526202b3c89456e5
-
SHA256
15091db9dea6c359131942d9bf23b793cc04a295b9ec4d3b188d6cc390fb6665
-
SHA512
4b99f4dea64cf8aa61dd30cafc8947b21db104e8fe5e3c34bfab6faed756197e692240b7154590e55ef95ac2ef064d3058a556d112d23a9d769b0d6024424ed6
-
SSDEEP
6144:dgHzV64Xus3fovwS6gUTitB4gqzJwBP8V3pM+Qt9WQpGb5Mx:dgjXNgwI4gHSZM+QbWt1Mx
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\MedWatch.job bdd16d42f20e858c8fc313a709f1f4de_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdd16d42f20e858c8fc313a709f1f4de_JaffaCakes118.exe