Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe
-
Size
782KB
-
MD5
fb7f9bdef7ea0285ec22333a50250943
-
SHA1
d92cd1dbcf607f879eeb53c4859cb0001ae827a3
-
SHA256
921e5887012771a1549d3ec8b40ceadbe9d328cffcc727b37131c96883a65b8e
-
SHA512
2c97ca4c6faa32916652e8a89531a18c4c2b569f3b491298dcb5d94c25c823bee14e0f1a0d06ceccc53aab7e38e44bfb9682c11b2758b9c8c9b836625ef7f86e
-
SSDEEP
12288:6um3NNhhsPoC7wYmHRCoLooVnIz+Q2Lyd5w798SRPG0EmDI:H97fUps2efw7980O0Ej
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1696-0-0x0000000000400000-0x00000000004C9000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1696 fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb7f9bdef7ea0285ec22333a50250943_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1696