Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe
-
Size
82KB
-
MD5
d213b25924d845ac4cd3d28e64240ec7
-
SHA1
21141696cda62ab967a3b2e68c84abea0d56167d
-
SHA256
4e63c35b380995d465f33434a8b29196995c26e73957c446cc4ec2a6f5571e29
-
SHA512
44bb9056b5df92f1ce812b7eec9818991605f7b3a17bd03b6370af71407d33faa06d43c0fe4301753b9e876c221a17fd8973e12266d908a462b57240b32bd658
-
SSDEEP
768:xNyegWDSPn3iei3Qy/XY0GWdtPmnCrnbl91NeVrp4ov0531BTTI1:LmvSt3Qy/o0fnPP/+6531C1
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2396 set thread context of 1680 2396 d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2396 d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1680 2396 d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1680 2396 d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1680 2396 d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1680 2396 d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1680 2396 d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1680 2396 d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1680 2396 d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe 30 PID 2396 wrote to memory of 1680 2396 d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\d213b25924d845ac4cd3d28e64240ec7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d213b25924d845ac4cd3d28e64240ec7_JaffaCakes1182⤵PID:1680
-