Analysis
-
max time kernel
10s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 03:52
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
fb73313456f2775e84d9fd60a6f49fd3
-
SHA1
b4e362530ff47da13b16f3a9d3be343b7f67e966
-
SHA256
b4b26e9ebba43ec5c968a67c744ef55cb02f075df6f4389b8e328282f4398a32
-
SHA512
7170ebbe7418a787ae36fc96497f71f5567771638e35572db79991d293517b3bfbc48bfb7e613f7cbedd69f6f00e6fab852cb2e86cbb751551227a72c98890f3
-
SSDEEP
24576:VCdxte/80jYLT3U1jfsWa4zcI3FmUNQJQ:8w80cTsjkWa4n
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2132 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 30 PID 2320 wrote to memory of 2132 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 30 PID 2320 wrote to memory of 2132 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 30 PID 2320 wrote to memory of 2132 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 30 PID 2320 wrote to memory of 2072 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 31 PID 2320 wrote to memory of 2072 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 31 PID 2320 wrote to memory of 2072 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 31 PID 2320 wrote to memory of 2072 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 31 PID 2320 wrote to memory of 3028 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 32 PID 2320 wrote to memory of 3028 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 32 PID 2320 wrote to memory of 3028 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 32 PID 2320 wrote to memory of 3028 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 32 PID 2320 wrote to memory of 2064 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 33 PID 2320 wrote to memory of 2064 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 33 PID 2320 wrote to memory of 2064 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 33 PID 2320 wrote to memory of 2064 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 33 PID 2320 wrote to memory of 2700 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 34 PID 2320 wrote to memory of 2700 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 34 PID 2320 wrote to memory of 2700 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 34 PID 2320 wrote to memory of 2700 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 34 PID 2320 wrote to memory of 2704 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 35 PID 2320 wrote to memory of 2704 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 35 PID 2320 wrote to memory of 2704 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 35 PID 2320 wrote to memory of 2704 2320 fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"2⤵PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"2⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"2⤵PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"2⤵PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"2⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb73313456f2775e84d9fd60a6f49fd3_JaffaCakes118.exe"2⤵PID:2704
-