Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 08:53
Behavioral task
behavioral1
Sample
fa1934445474d9b1e5a601e6dfffbcbb_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fa1934445474d9b1e5a601e6dfffbcbb_JaffaCakes118.exe
-
Size
358KB
-
MD5
fa1934445474d9b1e5a601e6dfffbcbb
-
SHA1
ed0dd7c69a5541c00078ed3918e358e3cbc0da64
-
SHA256
b5b34ca92900064b02bd7087e493f330569dcf2e6052cc995d4b63951c61878c
-
SHA512
552b1b952ee2286026086f95a295b8250a18fd94a5bc37a82b4ef55bdd20695503d547a94ef40fd62fb5c195527b727b05bbd73a5ce06209573995b33a1406f4
-
SSDEEP
6144:Jl8KWs/bWq+nR6xtEstSlckJ4OUSccLU4968TI+RjoSfK/:Jl837cCHJrccvZPRjoSfC
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1672-0-0x0000000000400000-0x000000000050C000-memory.dmp upx behavioral1/memory/1672-11-0x0000000000400000-0x000000000050C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa1934445474d9b1e5a601e6dfffbcbb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1672 fa1934445474d9b1e5a601e6dfffbcbb_JaffaCakes118.exe 1672 fa1934445474d9b1e5a601e6dfffbcbb_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58f970ed35ebcd9cb421c0120540468ee
SHA15f491df299a9b96e2879ada653cac300c4e2e427
SHA256b80c5bdf5b53d8d4d04113a8de3b0d26d2dd2160f5c206679f407e681a26c92f
SHA512cf4cc95c9e88c623fcc62993963582d085514744b2df328eadd29ce1b5971c49013873d8e7e6bc107a77f5843c1fff3fdbaca5ac8f84bbca113bec4adddf4f89