Overview
overview
7Static
static
3cbde38d56a...18.exe
windows7-x64
7cbde38d56a...18.exe
windows10-2004-x64
7$PLUGINSDIR/7za.exe
windows7-x64
3$PLUGINSDIR/7za.exe
windows10-2004-x64
3$PLUGINSDI...G].exe
windows7-x64
3$PLUGINSDI...G].exe
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
137s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 23:32
Static task
static1
Behavioral task
behavioral1
Sample
cbde38d56a2f4cb4f258c230f7882a37_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cbde38d56a2f4cb4f258c230f7882a37_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/7za.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/7za.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/[RANDOM_STRING].exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/[RANDOM_STRING].exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/[RANDOM_STRING].exe
-
Size
225KB
-
MD5
6397a893bf93dfff57feb64bdc63ea28
-
SHA1
b044be6c260474fe2bcbd2a320b9ddbee99fbeda
-
SHA256
7ca099efd1d53d8ee26ab9134ede7a2449c1111f3fd68618a8352a2430f94475
-
SHA512
b0bc6c1154df3cb0737b26dfd05e20fc1b375bbb11875d2c0658f88966203d62c985fa7d8afb92f0bb3bc304a6943593f151a923c7acded4ddffafdfa69a6b0a
-
SSDEEP
6144:3Lbii5bkgVuN+xSKV7Wkrsf7LscpILFThq4++KCkp:3XikbkgaISKV86ynVd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
[RANDOM_STRING].exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [RANDOM_STRING].exe