Analysis
-
max time kernel
129s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe
-
Size
28KB
-
MD5
f0ce0ea222563f5230ea9085cbae08a6
-
SHA1
78d1364e85f912cbd9801d39e1add50e2c0c8f46
-
SHA256
480d1b646edb12fa8611546b91d7649660c92cb2f867147294ba9f9fd060a646
-
SHA512
ece9b1d6917cb93f267b79b63a2d6b3baa29df6492a128238bf902e7cd37bdda4fd369757f6d8089cbba07d01ce7d1da5ace80e4f17524bdb0eb0ea6556c3eba
-
SSDEEP
384:ClXpvMFzjhHlar1tme7FXCosmTZsZW2PkbXp9:wXVMFzjqr15/sm9ssXbX7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2932 f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe 2932 f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2692 2932 f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2692 2932 f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2692 2932 f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2692 2932 f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2224 2692 net.exe 32 PID 2692 wrote to memory of 2224 2692 net.exe 32 PID 2692 wrote to memory of 2224 2692 net.exe 32 PID 2692 wrote to memory of 2224 2692 net.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0ce0ea222563f5230ea9085cbae08a6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-