Analysis
-
max time kernel
141s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 18:34
Behavioral task
behavioral1
Sample
d0349ff83765f96bda1207951a8eaf8f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d0349ff83765f96bda1207951a8eaf8f_JaffaCakes118.exe
-
Size
358KB
-
MD5
d0349ff83765f96bda1207951a8eaf8f
-
SHA1
4b9ee02817b4e84a86624b943862f8c686126046
-
SHA256
0a4baa5e8012f0c2d762f7227061bb3ee2bfd8049d0daa4607dcd90c9c381595
-
SHA512
3b053592a45650a92d4f9fa2955045ca9806c6558f31fd0d623fe792bf28626d25b73125f3b702a3bc7528d0315f9d6989c4f885ad8f52bee560a991553feed4
-
SSDEEP
6144:Il8KWs/bWq+nR6xtEstSlckJ4OUSccLU4968TI+RjoSTx:Il837cCHJrccvZPRjoSTx
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1672-0-0x0000000000400000-0x000000000050C000-memory.dmp upx behavioral1/memory/1672-11-0x0000000000400000-0x000000000050C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0349ff83765f96bda1207951a8eaf8f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1672 d0349ff83765f96bda1207951a8eaf8f_JaffaCakes118.exe 1672 d0349ff83765f96bda1207951a8eaf8f_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b50c4b520bf01fb2169b7e269353ecac
SHA12e3fab4f8db6ce8a13fda6ba698aea34245c545c
SHA2566c8a28582c6cef3949d02be2f2a5ff0d92c516b5a7f87cdfd8a46d225728ce3b
SHA512850739b575f2e033e2169d06ef0887b0f5c405411bd34085e55abaeaea2f06e4994d704538081366d2eda50d0e69a753c1f714abd8ec2f08d56bb3d5bfe15837