Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 08:22
Behavioral task
behavioral1
Sample
ed31b5d94e35dc4ebe0e36d4fc6f868d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed31b5d94e35dc4ebe0e36d4fc6f868d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed31b5d94e35dc4ebe0e36d4fc6f868d_JaffaCakes118.exe
-
Size
108KB
-
MD5
ed31b5d94e35dc4ebe0e36d4fc6f868d
-
SHA1
617efb2b77da440ea6556189728f616445e6828e
-
SHA256
990ccc084900c302273977c51d33e9f86c8be1275defa748942f2bfff855a381
-
SHA512
a8d614d8781cb8c565a20bd29390ffd7804383d184a9cc480b59585cd9710d0d36f14446fa2291375845854bea5c3a38ea78f2fa212d27e44801a5ca44399582
-
SSDEEP
3072:eFNUcekHxRkuHxSWMDUajQJf/p/itxBCBpEzImXnnvHI+zIcEjrp5:eHUcLxRkuRSWMDUaGf/p/sxWpEzImXnE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed31b5d94e35dc4ebe0e36d4fc6f868d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2000 2888 ed31b5d94e35dc4ebe0e36d4fc6f868d_JaffaCakes118.exe 31 PID 2888 wrote to memory of 2000 2888 ed31b5d94e35dc4ebe0e36d4fc6f868d_JaffaCakes118.exe 31 PID 2888 wrote to memory of 2000 2888 ed31b5d94e35dc4ebe0e36d4fc6f868d_JaffaCakes118.exe 31 PID 2888 wrote to memory of 2000 2888 ed31b5d94e35dc4ebe0e36d4fc6f868d_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed31b5d94e35dc4ebe0e36d4fc6f868d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed31b5d94e35dc4ebe0e36d4fc6f868d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵PID:2000
-