Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
eab24ae94147a44961a464d6ffdd3cde_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab24ae94147a44961a464d6ffdd3cde_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab24ae94147a44961a464d6ffdd3cde_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
eab24ae94147a44961a464d6ffdd3cde
-
SHA1
90ff0c195036acc91c2dcc568b4cf2e85e7c4e44
-
SHA256
6d17f1f6567f68b321ce509b71b1c4afb685c825187ac804545049086b3b08f7
-
SHA512
9017661d7632377da8081d3c19b63a49e754d51a2138ce4bb5c67845dea3c4c450a0c22fe26728adbfb0e34baa99b0cb18526164d47d51bca68ede30cb5c47b5
-
SSDEEP
24576:BRmJkcoQricOIQxiZY1WNM+QK88/ZQpadswvxrBnWEdSC:uJZoQrbTFZY1WNdQKzqpadvZrlTSC
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2348-0-0x0000000000400000-0x00000000004D8000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab24ae94147a44961a464d6ffdd3cde_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2348 eab24ae94147a44961a464d6ffdd3cde_JaffaCakes118.exe