Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 09:46
Behavioral task
behavioral1
Sample
c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe
-
Size
379KB
-
MD5
c89641a271083eb1d8afdbe6d042e08a
-
SHA1
ea8e36b3b2d7ea64b9b7263b95e8916fa838a4c0
-
SHA256
c307c7df671d9f00d2845ea6ed47236f3cf622b91ba9aeb3d0da4f7bbbe0263a
-
SHA512
f1bdb1c0b325b38e4d3c935513e992fd3aa59881424791f3db58462bd4db53b2970175d4377954e996409d9a67d4b7fedf0868e7f1d2e614b578aeae8d04cee8
-
SSDEEP
6144:OuJKq3G5Li4VSaIHVhfo6YiBshMPWsAMy6WqzK2ZXmcZ4nnN3TnPHT+g2aBCQZ5x:OuveLlVhGhwwBU+Wsg6WqZZXmcZi3TPn
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1556-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1556-22-0x0000000000400000-0x0000000000492000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1556-22-0x0000000000400000-0x0000000000492000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe 1556 c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c89641a271083eb1d8afdbe6d042e08a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a8063bd37d3c8fb3176a6bf140558a4d
SHA1e32cf4b407db3d3773ded13ff64b70fdbad7735f
SHA256bccb23d41c2cc69cf0c7d22c4314ca8181a513c6999b73e45307792830f4e482
SHA51282d749f6b17b21587fb345ca196a2aa83eca80ad66ed9c1ab88b36709bed14175d53afefe9acc0dafc4fad78ffb8df155193a6829bc857ad6d68b1c84af7b854