Analysis
-
max time kernel
84s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
fe7577929257fefa635c724864a62439_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fe7577929257fefa635c724864a62439_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe7577929257fefa635c724864a62439_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
fe7577929257fefa635c724864a62439
-
SHA1
5939b8fbf2518287c6b21dd7758d0cb385c44ce7
-
SHA256
87defe5194769f426f61a55342615c8014028ac82656f350555cb6d753816d11
-
SHA512
5ee4be789651c2fddabf64789bd2f4e2c702c166f176d6048da1611b63766ffdfd5472cbbad94d34717ef390e33e7acbe9369bac5a5faa717b44f5855ea5095c
-
SSDEEP
49152:n3UQ78zzi7cLgR3eYn9Ox2e1M0BxIkRxo5SxWvAd7xtLJDObXxkZt0EvAA:3027X3eYox2e1M0BxIkRxo5SpLLJDmXY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe7577929257fefa635c724864a62439_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main fe7577929257fefa635c724864a62439_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch fe7577929257fefa635c724864a62439_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" fe7577929257fefa635c724864a62439_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1308 fe7577929257fefa635c724864a62439_JaffaCakes118.exe 1308 fe7577929257fefa635c724864a62439_JaffaCakes118.exe 1308 fe7577929257fefa635c724864a62439_JaffaCakes118.exe 1308 fe7577929257fefa635c724864a62439_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe7577929257fefa635c724864a62439_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe7577929257fefa635c724864a62439_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b74dd03d76a874a6503a4c4516d22e2a
SHA162c0f0a9584aef57e558c0b5b805f57f143e2796
SHA256c5d567f66fe842665e967d7afd2c71a616c09db58608f409b9b9a995c464bb0d
SHA51291aeffc9bebeb85ec9e877e5752ee0cbbe1729512b66183a3cd6e6ae943c5eaf5a80c3cb9468c13f7dd0cea052e9119636c7552e7152eb4755aef8f86623ea29