Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe
-
Size
236KB
-
MD5
dcf507f792b8766218440a9b8f406a21
-
SHA1
91e05414fab175b039661fdbe27714bd18b7613d
-
SHA256
a502a65ea5e9af77a83922384dac18241694857619a642c1543237be89d1c2da
-
SHA512
6d472d44947105275dc0ee345649a95ce7b0ef4373d1fb24e4420d7c960a7bcee8a3e14e47a810b02d38c4c298c194a29eb75cfee21de3872cedddf27da1779d
-
SSDEEP
3072:0QLWOnFiCnkIDSrySPnhl0Cj/irN833f+y7bQ6wvCIWf2JjBX+Zf38+F9jsP0ymP:tACTD4Pbn3f+yfwKIW+fcf3tF5slihl
Malware Config
Signatures
-
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Fonts\Sun\__tmp_rar_sfx_access_check_259447883 dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe File created C:\Windows\Fonts\Sun\gos.bat dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\Sun\gos.bat dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe File created C:\Windows\Fonts\Sun\gos.vbs dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\Sun\gos.vbs dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe File created C:\Windows\Fonts\Sun\svchost.exe dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe File opened for modification \??\c:\windows\fonts\Sun dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2016 dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcf507f792b8766218440a9b8f406a21_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2016