Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 05:15
Behavioral task
behavioral1
Sample
cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe
Resource
win7-20240704-en
7 signatures
150 seconds
General
-
Target
cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe
-
Size
428KB
-
MD5
cebfc0870d54636b01b378732dde981b
-
SHA1
f929438c410b114920cdd64ce1a25bbef4eb7de5
-
SHA256
0b44887931dda356566dc05569e0f5e3b67645f6f5c9fe94a2588263bf9c0dc8
-
SHA512
4693dc12f22f4910aba601f691f3d525a99ef2ffa41375b2bd09c8d137626bfdc171d60f195c3a6c8bfb1a86a6408481e8cf10445869fce7d0630fadcee53ede
-
SSDEEP
12288:5pSaFLmkHhaofIBFNMhdEILYUpNz+3VsO:jlZ94ofIzN2z7pNQ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2520-0-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{BBAEAEAF-1275-40e2-BD6C-BC8F88BD114A}.job cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{BBAEAEAF-1275-40e2-BD6C-BC8F88BD114A}.job cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2520 cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2520 cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe 2520 cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2520 cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cebfc0870d54636b01b378732dde981b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:2520