Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
fe97fc7f3f842c9ebd9515ef01603516_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
fe97fc7f3f842c9ebd9515ef01603516_JaffaCakes118.exe
-
Size
559KB
-
MD5
fe97fc7f3f842c9ebd9515ef01603516
-
SHA1
7f700412d7be4d2d7e5ddd71c892c04ae483bde2
-
SHA256
bf77161ed2e69015df1b459df710e5c8148dd3e2a6241067bc84f0d2a5ad73cc
-
SHA512
ef714a4f7c47f5caecb5807b543c8cd4fdd6160f00e7585a67723e7ccaa82b03073f5c4c2bebb9a3318cb1d2688d94cf52f492ca71f8207a7302fead4de45ade
-
SSDEEP
12288:YOPbAw4aLP6bhamf0mOkgKfjOoHnBc23ynBc:tPbAwLzyhmP6FHr3y
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum fe97fc7f3f842c9ebd9515ef01603516_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 fe97fc7f3f842c9ebd9515ef01603516_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe97fc7f3f842c9ebd9515ef01603516_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2388 fe97fc7f3f842c9ebd9515ef01603516_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe97fc7f3f842c9ebd9515ef01603516_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe97fc7f3f842c9ebd9515ef01603516_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2388