Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
df556107f0021b43e177737446856eea_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df556107f0021b43e177737446856eea_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df556107f0021b43e177737446856eea_JaffaCakes118.exe
-
Size
388KB
-
MD5
df556107f0021b43e177737446856eea
-
SHA1
68b808353658c56d2f2ea9917a3225868e1769ef
-
SHA256
d3760c435b40ed769cb17c89374fd24579303c4f2c481cc7629ff6341a3581ae
-
SHA512
fc6dcee84275266dd32ce9b01f06a8078f49bd2624cef08489cce7d728e8b1b349ecbd816a0db7f99ac5409b9e91e275fcfd448929adaa89ea540698a4a86da9
-
SSDEEP
6144:kU1UAomP9Veo1SKm1ebkvIgD7cftK/BivaQJs/w4d2pP+kB6c769/c:kyomzSKpTgfX/Os/w4duWkYc769k
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1716 set thread context of 2952 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe 31 PID 1716 set thread context of 0 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df556107f0021b43e177737446856eea_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df556107f0021b43e177737446856eea_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2952 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe 31 PID 1716 wrote to memory of 2952 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe 31 PID 1716 wrote to memory of 2952 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe 31 PID 1716 wrote to memory of 2952 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe 31 PID 1716 wrote to memory of 2952 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe 31 PID 1716 wrote to memory of 2952 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe 31 PID 1716 wrote to memory of 2952 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe 31 PID 1716 wrote to memory of 2952 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe 31 PID 1716 wrote to memory of 0 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe PID 1716 wrote to memory of 0 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe PID 1716 wrote to memory of 0 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe PID 1716 wrote to memory of 0 1716 df556107f0021b43e177737446856eea_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df556107f0021b43e177737446856eea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df556107f0021b43e177737446856eea_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\df556107f0021b43e177737446856eea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df556107f0021b43e177737446856eea_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2952
-