Analysis
-
max time kernel
140s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 04:16
Behavioral task
behavioral1
Sample
ef0cf6988749211bca2afd29536f7a97_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef0cf6988749211bca2afd29536f7a97_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
WinKawaks.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
WinKawaks.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
WinKawakss.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
WinKawakss.exe
Resource
win10v2004-20240802-en
General
-
Target
WinKawaks.exe
-
Size
350KB
-
MD5
0b459a1462f02809e33d5d9345b956da
-
SHA1
98d5b12a0f2badd73dbfc57d8eca789712d5ba16
-
SHA256
5a88b8d682d63e3319d113a8a573580b8881e4b7b41e913e8af8358ac4927fb1
-
SHA512
93a5864f8795078ffae7152d880b70219383b5c210ec18c06d1e884e8eb565ee50380937d5b841a5449fc0f99ac7b6aa68cc6b5879f07293eae114690a93eade
-
SSDEEP
6144:VkUW4PFUxkfsWYUc3wWtY4I4vTIZ6z37YyQYxuY+1bDGL6Sp:yyK+Ro3wWtXI4vTjMyQ3Y+Q6g
Malware Config
Signatures
-
resource yara_rule behavioral6/memory/4424-0-0x0000000000400000-0x0000000000734000-memory.dmp upx behavioral6/memory/4424-2-0x0000000000400000-0x0000000000734000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinKawaks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4424 WinKawaks.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4424 WinKawaks.exe 4424 WinKawaks.exe 4424 WinKawaks.exe 4424 WinKawaks.exe 4788 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinKawaks.exe"C:\Users\Admin\AppData\Local\Temp\WinKawaks.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4424
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4788