Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe
-
Size
206KB
-
MD5
06a43150ae5e02ba4a931b3572548804
-
SHA1
64e3df992c79cb47c1b6897f4902349589b9fa17
-
SHA256
5c1344ad19f00ca5b6da174ea93247d404ec941107130c3bd8fa5bd01313e37d
-
SHA512
df2a49bcdfb24cd590cb0731f58bdf8232184a73e1720820b428301fe88036d0acff01ccfc9b73881fd8a1838d2bb81f7929dd869c749432136de8dc075594c8
-
SSDEEP
3072:upTqaoFEUX6rO+Mpm9bTAaCOKY8P5EZsetaj/v9hNTw:u0aYX6rO+MpmqaCOK15DetQv9hK
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\explorer.exe 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2704 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2704 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2704 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2704 2420 06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06a43150ae5e02ba4a931b3572548804_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\windows\SysWOW64\explorer.exec:\windows\system32\explorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:2704
-