Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 15:26
Behavioral task
behavioral1
Sample
c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe
-
Size
382KB
-
MD5
c108312d8d2a64a8fd4999f7aa9a9f62
-
SHA1
ac9109298465d260d18ae7d0cc5551358aecd7d8
-
SHA256
023ae3ae8ef37daf6597d3fea03830cb7690926d086e0f0f64f3efb1b5176dc3
-
SHA512
16b1aeaa3a9f7d0fa8bdeec2c0fbc93416336f0276363f42b7b0cf6f09b58be57d912cec369e4fb739eab64a4e3ac5faf7b2d4e097204b814c754bd66d72caa9
-
SSDEEP
6144:w9vAGKlR5o7pXd4eoj17p5OMf3MnfQgPBZ2UoYs2iylLJdSSk9iFfSRgVo:6ATX5otX5+1n/vCfdBZ2UPWIKxvg6
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3304-0-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3304-8-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3304 set thread context of 4708 3304 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4708 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 4708 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 4708 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 4708 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3304 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3304 wrote to memory of 4708 3304 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 84 PID 3304 wrote to memory of 4708 3304 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 84 PID 3304 wrote to memory of 4708 3304 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 84 PID 3304 wrote to memory of 4708 3304 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 84 PID 3304 wrote to memory of 4708 3304 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 84 PID 3304 wrote to memory of 4708 3304 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 84 PID 3304 wrote to memory of 4708 3304 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 84 PID 4708 wrote to memory of 3392 4708 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 55 PID 4708 wrote to memory of 3392 4708 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 55 PID 4708 wrote to memory of 3392 4708 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 55 PID 4708 wrote to memory of 3392 4708 c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c108312d8d2a64a8fd4999f7aa9a9f62_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4708
-
-