Overview
overview
7Static
static
3cb0151d03b...18.exe
windows7-x64
7cb0151d03b...18.exe
windows10-2004-x64
7$PLUGINSDIR/7za.exe
windows7-x64
3$PLUGINSDIR/7za.exe
windows10-2004-x64
3$PLUGINSDI...G].exe
windows7-x64
3$PLUGINSDI...G].exe
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
83s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
cb0151d03bab52b31f5a14a7743099fb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cb0151d03bab52b31f5a14a7743099fb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/7za.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/7za.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/[RANDOM_STRING].exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/[RANDOM_STRING].exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/[RANDOM_STRING].exe
-
Size
225KB
-
MD5
2ddc4f48d2e49309657fbc6f1f45bbbd
-
SHA1
7233bd0092291f886d40be56dd71d798d845ba9c
-
SHA256
feb97f1b070eb2b01cc5d4e22f1a5113ea558bf0c129ebdedfc06f45662e419c
-
SHA512
3ffede2b4f1e799127c22cb0e555df36ab7119db71416185e5b0c7f686e5e50eb82dd4a88eebd3d6b8b04fb6f1bda9b3268b5865eb163e444747bc017bdf8252
-
SSDEEP
6144:3Lbii5bkgVuN+xSKV7Wkrsf7LsSqyVNwv67xmlX:3XikbkgaISKVyhTwi8X
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
[RANDOM_STRING].exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [RANDOM_STRING].exe