Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe
-
Size
224KB
-
MD5
db601c74ee721586957a7f2fe2903d56
-
SHA1
f6d0e6d016d9771244c792072c8bbf487067b951
-
SHA256
b1a918e667f07aa95fa349438babf654557e7b1d28d05803d2f5ad3fbcac7527
-
SHA512
9408ec80baba5e4bb441ad72f94fbfba3f5399a13a2c33bb4af1e49d37ce749e992e31cc321d76fc9d298732fb4379994f92620fcd64d705899bc8fe3a3f999c
-
SSDEEP
6144:UkEpwNtshfc4v00FxMW71bevuszWmr/gP3:UkEpw3sfHl71Xl
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2464 set thread context of 2064 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 31 PID 2464 set thread context of 0 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2064 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 2064 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2064 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2064 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2064 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2064 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2064 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2064 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2064 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2064 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 31 PID 2464 wrote to memory of 0 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe PID 2464 wrote to memory of 0 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe PID 2464 wrote to memory of 0 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe PID 2464 wrote to memory of 0 2464 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe PID 2064 wrote to memory of 1216 2064 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 21 PID 2064 wrote to memory of 1216 2064 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 21 PID 2064 wrote to memory of 1216 2064 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 21 PID 2064 wrote to memory of 1216 2064 db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db601c74ee721586957a7f2fe2903d56_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064
-
-