Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe
-
Size
139KB
-
MD5
ebab52da7fbdbace1eee5a357ec3ea87
-
SHA1
6065c5176c14ba1b4296ca044a763c0553b1c311
-
SHA256
167b1cc491c97500887d2a3a3b090b83311d4d2af78cde8f0932e49fe89e3c97
-
SHA512
f3f46615b02b9c12d7ef7d9a2cce649aacbfef39fca6d0c1b16257c410807cdbb4018cdd914562044b2c796bea0ea12452e07e8080b6e12f90cfaa2521c1f7ed
-
SSDEEP
3072:9MCNNzD8ATVWqpvw7PdRrrRlhMByMnUFgt8Ugar6dU70:9MCNNzD80kqpvE/dYMMUOWUgar6W0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2272 2084 ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2272 2084 ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2272 2084 ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2272 2084 ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe"\\?\C:\Users\Admin\AppData\Local\Temp\ebab52da7fbdbace1eee5a357ec3ea87_JaffaCakes118.exe" 55636449650536140902⤵
- System Location Discovery: System Language Discovery
PID:2272
-