Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
e1cba9108fee2daee4ed867feae37c44_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e1cba9108fee2daee4ed867feae37c44_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1cba9108fee2daee4ed867feae37c44_JaffaCakes118.exe
-
Size
361KB
-
MD5
e1cba9108fee2daee4ed867feae37c44
-
SHA1
f0ed201f025b94eb37ec0207246f459fea59e469
-
SHA256
3698e6c9996d92bd98572eb4c13c0c8d70868e2d449dc035a59244405b37fde1
-
SHA512
443fc604a449749411f477b420e4782b86eb8165a1bae3220a28c3f75a807e50f3e56a5fd4d66a24e4b905ec5ea15b3dcbf1db9f1d521d0534c42cc8f4406248
-
SSDEEP
6144:kNY74FSjWH3Mr07oz5rbh2H/PU0lW43XoJdvb+93SEjbEfpBQ38v2rrIISveLoe:9gIWHcAIAH643XidT+9bi/Q3lzSvA
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/304-1-0x0000000000400000-0x00000000004DB000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1cba9108fee2daee4ed867feae37c44_JaffaCakes118.exe