Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 09:29
Static task
static1
Behavioral task
behavioral1
Sample
009c347356570bd0c3c186af9b616992_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
009c347356570bd0c3c186af9b616992_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
009c347356570bd0c3c186af9b616992_JaffaCakes118.exe
-
Size
60KB
-
MD5
009c347356570bd0c3c186af9b616992
-
SHA1
31166ab9902c4cab760c8bb3c268a8a48ddfd64d
-
SHA256
553385e1b99b137d06982e1e0221b2df94e4f241227584cc5a683f8f3488979a
-
SHA512
fde00b19033a80cf1b1daa14d81205b41800a2ac8ef7c318d40150c78ac2095fd556f6c4e777505e8ee996c92673875a4585710654365f758af39f7ceae427c5
-
SSDEEP
1536:vSRaa8kuIKC1BypXJw2qCEz38JvVTskghZu:vSRae+C1ApZhzfWho
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 009c347356570bd0c3c186af9b616992_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 009c347356570bd0c3c186af9b616992_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4740 wrote to memory of 2436 4740 009c347356570bd0c3c186af9b616992_JaffaCakes118.exe 83 PID 4740 wrote to memory of 2436 4740 009c347356570bd0c3c186af9b616992_JaffaCakes118.exe 83 PID 4740 wrote to memory of 2436 4740 009c347356570bd0c3c186af9b616992_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\009c347356570bd0c3c186af9b616992_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\009c347356570bd0c3c186af9b616992_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\009c347356570bd0c3c186af9b616992_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\009c3473" 482⤵
- System Location Discovery: System Language Discovery
PID:2436
-