Analysis
-
max time kernel
94s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
d2c918e8535c37d65d57d2b4141cb9c4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2c918e8535c37d65d57d2b4141cb9c4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d2c918e8535c37d65d57d2b4141cb9c4_JaffaCakes118.exe
-
Size
350KB
-
MD5
d2c918e8535c37d65d57d2b4141cb9c4
-
SHA1
af081b967a6b2f8110b70ba09ff8b1ea481b8bb5
-
SHA256
cdffa2f3517d4db5616e4dc6239d82e9b60af12a0a2e6850635b891996167015
-
SHA512
1734285e0ba11733688eb457a336e0404f868d2c7d8d7a3d109f1a743c958ca44ea98241954bbb640e1f826c91b57db511bd9288c8133be49072d306d081fcf9
-
SSDEEP
6144:vCbpTf6a47RbVUlZpgLRbaqWabiKL/RGudiiIhcZ0v+Xl1RD+sV7z+iDGvmCkJvX:wf7UVKZpaNXACZ7lZ0SjqwWiaFg
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\0.exewsPowøh\e d2c918e8535c37d65d57d2b4141cb9c4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2c918e8535c37d65d57d2b4141cb9c4_JaffaCakes118.exe