Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 20:05
Behavioral task
behavioral1
Sample
ff3e6a05adb8bc80488a060f50fdeb7b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ff3e6a05adb8bc80488a060f50fdeb7b_JaffaCakes118.exe
-
Size
17KB
-
MD5
ff3e6a05adb8bc80488a060f50fdeb7b
-
SHA1
92ffa7c81c39118b16d54a723de6fa25702f143c
-
SHA256
07e81cb2602667edfba4959156e15350e693a773a75b75850edf0f72080adba6
-
SHA512
b29cbd47cdc6f2956588c6175bd102d9f1d351c81e824be9ca7f1be5385701010aee6040d59367165a3f5662574073eb5398d415699554fd49d52bc2f35d41e2
-
SSDEEP
384:TwsT6EXfwYK6SNquSD+MAoZmhaGgLVHl0:TwYXfwBNqFAoiGC
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2948 ff3e6a05adb8bc80488a060f50fdeb7b_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2948-0-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/2948-8-0x0000000000400000-0x0000000000413000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff3e6a05adb8bc80488a060f50fdeb7b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2948 ff3e6a05adb8bc80488a060f50fdeb7b_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD56949ec0689b08a017922ee3571d7cf02
SHA17f6bf247bd25fa4abfb01c31d6bcacf159691da0
SHA2560c9013e8e476ba0d0975db0b0d8847534d5442c4b6f46ac83733a32be257d527
SHA51267f8499f83310d6bd735d58bb5ef519539f1a8f079e3e2caa0f4279734e731cda462c548c5ba5d2bfd53780487925a647829f60272c3d7f50e9bac0b954ccde8