Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 12:54
Behavioral task
behavioral1
Sample
fc5819728df12084dd5a51f9b9da45d3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fc5819728df12084dd5a51f9b9da45d3_JaffaCakes118.exe
-
Size
355KB
-
MD5
fc5819728df12084dd5a51f9b9da45d3
-
SHA1
a5960cf8208e3e803d5107d630ce8228b73199f7
-
SHA256
7e792419c102e64f46b6de8cdcf8b4bdc3dc0b13da6fbaee751f7676b1e34d89
-
SHA512
c73f0d2cd64510bfce51b8bb56748ac35b47a1d29f3ce1620b3afda5cf2cb19a7c98ea66c3459dd0a83dbaf3e6b85471cabc94f5b2314fa0d033a6405b9d7fb3
-
SSDEEP
6144:+dRNNx2pmGDa+D39r0JFPlGQD9gjmzjiKyxl/ExEzw15J+yGybbKZQtlk2Y1vASz:ENx2Q+D39QFPhPkcxKw15J2yiQtm5vtz
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2460-0-0x0000000000400000-0x0000000000508000-memory.dmp upx behavioral1/memory/2460-11-0x0000000000400000-0x0000000000508000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc5819728df12084dd5a51f9b9da45d3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2460 fc5819728df12084dd5a51f9b9da45d3_JaffaCakes118.exe 2460 fc5819728df12084dd5a51f9b9da45d3_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD579548924126de69d164209bee2ab2afd
SHA1e3512ee5e4180ab5429e540518fc9fe90c3d6e0a
SHA25647c4c6b1ce4ee8e6ff162217ee81f8a6d6c58fc0fba4d6b6c4fe25a7fad9b21c
SHA512b7f10362565549ce399e19d605c6c71569d0dcb5e9c4fcc73d07512aaa131d11fd121ddb1ec3df4c9132a713eee29fda22c168e0112a958ee202fefbb550ca80