Analysis
-
max time kernel
141s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 06:33
Behavioral task
behavioral1
Sample
fbb3d53cea267825bb97cf462c025ba5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbb3d53cea267825bb97cf462c025ba5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fbb3d53cea267825bb97cf462c025ba5_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
fbb3d53cea267825bb97cf462c025ba5
-
SHA1
67adaefd0658b75a83b69d4b229f76091a3e58c6
-
SHA256
8a418295b6ec424c52cde190e2825ed71245aa86f92d73a9206898ca5e725050
-
SHA512
3694d02e0aaf8e8479013ab5e50e3337050513fe6d7a4fedc83df0960a651925e2a1d159eac7fe15ca6609f7da93efcc89336dbd3b5d643a20b6adee5b68e477
-
SSDEEP
49152:/L4HmS8ckUgzgU1cTbs0I1DpIYBzgjnXODhG8GWmDXNSQTMKCkKc6cdaxsRO+Az4:kGS8cVgzgmcU0I1Dp/dqnXbWmDXNTTMc
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Arquivos de programas\\WindowsUpdate.scr" fbb3d53cea267825bb97cf462c025ba5_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3020-0-0x0000000000400000-0x0000000000F89000-memory.dmp upx behavioral1/memory/3020-2-0x0000000000400000-0x0000000000F89000-memory.dmp upx behavioral1/memory/3020-5-0x0000000000400000-0x0000000000F89000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbb3d53cea267825bb97cf462c025ba5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 fbb3d53cea267825bb97cf462c025ba5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbb3d53cea267825bb97cf462c025ba5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbb3d53cea267825bb97cf462c025ba5_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3020