Analysis
-
max time kernel
95s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 02:50
Behavioral task
behavioral1
Sample
e19028387bba4a56040f7b9514279220_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e19028387bba4a56040f7b9514279220_JaffaCakes118.exe
-
Size
295KB
-
MD5
e19028387bba4a56040f7b9514279220
-
SHA1
b1ef53f7f565396530f341fbe6ca1c088feae7fd
-
SHA256
4a85d0c79fe3c958320c6be9679172e4bd7f99183bfd1d9632bde51c12098c3b
-
SHA512
af053802ba48cb5cf8a8a9de9308b1a5ccd045975a105c355c14e0f5dfc6545056cbd60c4a287044619d79542fa1b810dac3ced83e66924c10900869c34a6373
-
SSDEEP
6144:auIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIQ:x6Wq4aaE6KwyF5L0Y2D1PqLa
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4428-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4428-9-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4428-9-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\Cpitall.dll e19028387bba4a56040f7b9514279220_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e19028387bba4a56040f7b9514279220_JaffaCakes118.exe