Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
fa6b50c621f6f2799038a229fb1ffcbb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa6b50c621f6f2799038a229fb1ffcbb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fa6b50c621f6f2799038a229fb1ffcbb_JaffaCakes118.exe
-
Size
5.1MB
-
MD5
fa6b50c621f6f2799038a229fb1ffcbb
-
SHA1
9a9bb926e6314652f04b0864791b87601ab7dc24
-
SHA256
2255ae69ff561d4596bfe762b0a621577e9443f76504a333223d87828be9187f
-
SHA512
d302a472ce1f130a6f8dccc379e4c9ec11e634fa3c14837d043502c72598029521edac8c0b1959a0838c83058640e27ba2b7447d42829d0258bd8704b859488e
-
SSDEEP
98304:eX4f3bYSW48lLrfHL35Zc19fKfYkl7mxeE0CVN2zpTd9Hw1wA:5frY68x35Zc/KwkyeFC/2hY
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2820-1-0x0000000000400000-0x00000000005F4000-memory.dmp upx behavioral1/memory/2820-2-0x0000000000400000-0x00000000005F4000-memory.dmp upx behavioral1/memory/2820-3-0x0000000000400000-0x00000000005F4000-memory.dmp upx behavioral1/memory/2820-5-0x0000000000400000-0x00000000005F4000-memory.dmp upx behavioral1/memory/2820-6-0x0000000000400000-0x00000000005F4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa6b50c621f6f2799038a229fb1ffcbb_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 fa6b50c621f6f2799038a229fb1ffcbb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2820 fa6b50c621f6f2799038a229fb1ffcbb_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa6b50c621f6f2799038a229fb1ffcbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa6b50c621f6f2799038a229fb1ffcbb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2820