Analysis
-
max time kernel
140s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe
-
Size
726KB
-
MD5
d3ae4a4423d0c9fa737df975c4eba4ab
-
SHA1
71964b7dc240fe7ec241155bc1acda589cc65941
-
SHA256
d4ec7bcd6cbc7dc9dfb162fa94dbbd39bf10d2c5f2b9deb8ef3113b7db98d333
-
SHA512
95c479ee9d7a8449213c25a4a050ac76f5b9c735919dfc3fb9c4f0c4a329d08f6964e5fd6cedb288514fd4a01f43938a9d25c881ed5c03b0aec30cb17084dd31
-
SSDEEP
12288:FMpyneZziS4s+NFTZNgBblYPJ0B/0PBc/HcL1D9yfFzKyUr7F3Z4mxxsDqVTVOCO:FSIC/n+NF1Ncby5GvK1Yf5KyoQmXLVTi
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe File created C:\Windows\system32\drivers\etc\hosts d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1104 d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe 1104 d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe 1104 d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe 1104 d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe 1104 d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3ae4a4423d0c9fa737df975c4eba4ab_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1104