Analysis
-
max time kernel
130s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
bff0ea7c9f7732f3b3bc823ea814f7de_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bff0ea7c9f7732f3b3bc823ea814f7de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bff0ea7c9f7732f3b3bc823ea814f7de_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
bff0ea7c9f7732f3b3bc823ea814f7de
-
SHA1
6d3cfb3606b98d70b4db326d23a62b0d15619aee
-
SHA256
c59a7f8d75fb38e091d5b47ac94262e16b451ddcf9ebbfec2177bb62cf4473f6
-
SHA512
43d8c3fbfee8897c1ae049f37dd1669b15e24f40cd09b0ac98d59ed723514cc1f1c8141d7126da5027a060bc6fc8831de46e7dec7cc6457e6dbd6539db467b30
-
SSDEEP
49152:4EsRrFplZ8/Tr4TduR8gNFI1qoouXH6I6+JWySF92ci35DvS5OAl+P5A9H77:PwvlSvQgTI1FjDSWci3tWYC
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2540 bff0ea7c9f7732f3b3bc823ea814f7de_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bff0ea7c9f7732f3b3bc823ea814f7de_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 bff0ea7c9f7732f3b3bc823ea814f7de_JaffaCakes118.exe 2540 bff0ea7c9f7732f3b3bc823ea814f7de_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bff0ea7c9f7732f3b3bc823ea814f7de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bff0ea7c9f7732f3b3bc823ea814f7de_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2540