Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe
-
Size
56KB
-
MD5
ea5432e148fbb2697eb0ade9b7537943
-
SHA1
be0b7f707da65bc988e90291b97079a451621f53
-
SHA256
5dd8ce3a941ecd308262efd372d557cc7a3df204e88e172e3d308eb96bdde541
-
SHA512
dd185b0e9d758994e542945f921fcda2eb119844126862790f7d73cb37cca3ba431b409ccb6dfb437a3b96a86c783e8c921fc4f1f5e3bb8725bbe21afbb95baf
-
SSDEEP
1536:/yg77o4YrM7Ay6je06/a36hRd6he46h4t6hEOM:qg77o44wAy6je06/a36hRd6he46h4t6I
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Desktop ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\????.scr" ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Desktop\ScreenSaveTimeOut = "300" ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0AB57806-CAB5-4D22-9852-3AFD9C4E3C39}\DisplayName = "??" ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0AB57806-CAB5-4D22-9852-3AFD9C4E3C39}\URL = "http://s.q78.com.cn/?{searchTerms}" ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Internet Explorer\SearchScopes ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{0AB57806-CAB5-4D22-9852-3AFD9C4E3C39}" ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0AB57806-CAB5-4D22-9852-3AFD9C4E3C39} ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3972 ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea5432e148fbb2697eb0ade9b7537943_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3972