Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
ff79656b57a18064e77c26830d1388e4
-
SHA1
8a0ad3118abed1fda19e86e4fe248bcc948a2f8b
-
SHA256
b371de162d56e357fa2c6529ed9e288249e0883b83aabba0fe661995ce92b846
-
SHA512
2600dea3dddab44e705a7e60f76694e1ff3822bec7c28bb60a130ab97ca8056f5b78c464a2d8897a4fa9590cde8a5609900786e339a98637344e01a03b7883cb
-
SSDEEP
24576:ElnsslKEtRq6wpGuNYlQiVWmQRQekYK9bJIGb:B4nCbQekYu
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Nero Check = "C:\\Program Files (x86)\\arquivos comuns\\nero check\\nerochek.exe" ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\arquivos comuns\nero check\ ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\arquivos comuns\nero check\nerochek.exe ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\media\mp3\ ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe File created C:\Windows\media\NewIcon.ico ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2104 ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2104 ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff79656b57a18064e77c26830d1388e4_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
PID:2104