Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 20:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe
-
Size
123KB
-
MD5
073fb351c81b130729624fdf5e1686c1
-
SHA1
adb97fbdc5c1c1ad88801f5cb91e091f8c9e5859
-
SHA256
8049ba2f8aa1118f93062298ad2e7537612adbabc4e34abdb2212d5cf4bbed8b
-
SHA512
f270cc319de79999a251eb8932fa3a44161679e5d32d34baeb7eaf3b37d22bbe89d23ebd9a56ecf7a9ca92c2bfd1c4efab93e588cbc960e59ab64d29a78422f1
-
SSDEEP
3072:mjYUThsPCPyRkpfYpdrrEU6GSDlUylcVhGrUrREXHiEN:6YUdeCqRk1CPEU6GaWyyVhGWE3FN
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2344 set thread context of 1044 2344 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe 31 -
resource yara_rule behavioral1/memory/1044-1-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1044-4-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1044-5-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1044-7-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1044-10-0x0000000000400000-0x0000000000420000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1044 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1044 2344 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe 31 PID 2344 wrote to memory of 1044 2344 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe 31 PID 2344 wrote to memory of 1044 2344 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe 31 PID 2344 wrote to memory of 1044 2344 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe 31 PID 2344 wrote to memory of 1044 2344 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe 31 PID 2344 wrote to memory of 1044 2344 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe 31 PID 2344 wrote to memory of 1044 2344 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe 31 PID 2344 wrote to memory of 1044 2344 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe 31 PID 2344 wrote to memory of 1044 2344 073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\073fb351c81b130729624fdf5e1686c1_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1044
-