Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
d2668c20ed0b1df8b6a7929face687e5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2668c20ed0b1df8b6a7929face687e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d2668c20ed0b1df8b6a7929face687e5_JaffaCakes118.exe
-
Size
512KB
-
MD5
d2668c20ed0b1df8b6a7929face687e5
-
SHA1
142251ee0b37ee96b07cd477617c27d091595481
-
SHA256
d1aab6dfa1a45af81e2ef196e975a2fa9179e987ebec5ecf824a8d1cdbee4594
-
SHA512
235352d8c8bc4d31b5d7b17d36418aea560ee40b3dcc30f40ae0658d88d405f33b764283f2356c05d13cc80017db855c19d90ed2c606651e073719aaee833bf7
-
SSDEEP
6144:pJr2u3vc+qmw4GMQUYk5ffhC7qBT9qvhHYMVQSgt9uIYxC9RuAjlvXCx:X2QPqmw4G1qBT9MPVQfjLSEfs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d2668c20ed0b1df8b6a7929face687e5_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2668c20ed0b1df8b6a7929face687e5_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 64 IoCs
Processes:
pid 4 4 4 4 4 656 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2668c20ed0b1df8b6a7929face687e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2668c20ed0b1df8b6a7929face687e5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3636
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:2912