Analysis
-
max time kernel
29s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
e4f09c0fe74958f99bacbbee1ad95935_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4f09c0fe74958f99bacbbee1ad95935_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
e4f09c0fe74958f99bacbbee1ad95935_JaffaCakes118.exe
-
Size
475KB
-
MD5
e4f09c0fe74958f99bacbbee1ad95935
-
SHA1
baedcded81916113a3af1f9ca18bd42272897d68
-
SHA256
2e0997482c43dd1fcc291a7e66bcfadcba3573a4befe1f0ec17122d453ddcebd
-
SHA512
a61ccca7e28d7405f30622dc75aa215f16cd67db12397c49bad70f2bb9674545261d95984e60f8b80e0c5bd6d2d00ce1f61804ac8bf85321302839e179843419
-
SSDEEP
6144:by1IA6z8De5YLU62thTHBl1Wm5lAxGqxFkkELeNgRkQdfFyDFvDLt1iiiiL8CVmR:biIA6gehThl1YxGIULeqR58RDtMsY5r
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: e4f09c0fe74958f99bacbbee1ad95935_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4f09c0fe74958f99bacbbee1ad95935_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4488 e4f09c0fe74958f99bacbbee1ad95935_JaffaCakes118.exe 4488 e4f09c0fe74958f99bacbbee1ad95935_JaffaCakes118.exe 4488 e4f09c0fe74958f99bacbbee1ad95935_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4f09c0fe74958f99bacbbee1ad95935_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4f09c0fe74958f99bacbbee1ad95935_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4488
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:2424