Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 11:18
Static task
static1
Behavioral task
behavioral1
Sample
efad9cd394a573426f8613a1bf26ac5d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efad9cd394a573426f8613a1bf26ac5d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
efad9cd394a573426f8613a1bf26ac5d_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
efad9cd394a573426f8613a1bf26ac5d
-
SHA1
6ef5a80d1646d2f011d0f02edf6e8091db540b0a
-
SHA256
fdea7526c156c1ab5bf1a160bec41bc25d07c2845a7d11adaff9f76e99585202
-
SHA512
1fa209ea02911038c3c06274a4e77561ff546b7803e4f8a76aa97010038f33e36663c36e1ceb59302a3ef0d3ff9466a0fd7ced6861a500ae1bbef89ec84b1b8e
-
SSDEEP
98304:pYA4m9hV+xSTkdhTBrHJWGs2NyqeoNE/7SRYYB:gUhV+xqUTVHJack+L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efad9cd394a573426f8613a1bf26ac5d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3564 javaw.exe 3564 javaw.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2296 wrote to memory of 3564 2296 efad9cd394a573426f8613a1bf26ac5d_JaffaCakes118.exe 82 PID 2296 wrote to memory of 3564 2296 efad9cd394a573426f8613a1bf26ac5d_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\efad9cd394a573426f8613a1bf26ac5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efad9cd394a573426f8613a1bf26ac5d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "C:\Users\Admin\AppData\Local\Temp\efad9cd394a573426f8613a1bf26ac5d_JaffaCakes118.exe" org.develnext.jphp.ext.javafx.FXLauncher2⤵
- Suspicious use of SetWindowsHookEx
PID:3564
-