Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
be381dd969f69990614c3af88692fe41_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be381dd969f69990614c3af88692fe41_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be381dd969f69990614c3af88692fe41_JaffaCakes118.exe
-
Size
528KB
-
MD5
be381dd969f69990614c3af88692fe41
-
SHA1
fd1f3517a74148a551fb4553a7ccf168c2df6958
-
SHA256
58cf9552252928b43ed95e1dab50ead0ef9c1b45ea823ca5c049a023ba353016
-
SHA512
81342e22dc258f7c6066c593fa95dbfa2b8c33c9546e488341e3143b419857adc883dbf198ac9035ce7dfa4e2dda5a396bd578cb0b2a5ac8cc589329d7c20194
-
SSDEEP
12288:oSXh8tDMRyw8ELU4KA/uB65EUEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEm:oSx8tgRyLELrKAGB6uUEEEEEEEEEEEE4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be381dd969f69990614c3af88692fe41_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4152 be381dd969f69990614c3af88692fe41_JaffaCakes118.exe