Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
0b756054e16a795f5796ee44ddb81a4e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0b756054e16a795f5796ee44ddb81a4e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b756054e16a795f5796ee44ddb81a4e_JaffaCakes118.exe
-
Size
309KB
-
MD5
0b756054e16a795f5796ee44ddb81a4e
-
SHA1
2799f4afc2da2922d05c24ef82399cec9565d2c0
-
SHA256
87aa38d52ae0cc137f2de1509205805c8d0b606c007450623791715f0048c037
-
SHA512
99e72e6bc406ebaf529cf1e57a8341b16328a3c4629b95e8b780d5343b98201de3c155f5703a3cfaa4f8034390f070dbd3b5c5cf4fb9d787cf543cd20da67ebd
-
SSDEEP
6144:Ir+8I5RxWBDg7V0eXze6OvA48E4XGvriXOkrta2my9xVtGmJmvY8eTaL:Ir+8I3sBDJejgPIXGvmXOL2my9xVYrvx
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2280 0b756054e16a795f5796ee44ddb81a4e_JaffaCakes118.exe 2280 0b756054e16a795f5796ee44ddb81a4e_JaffaCakes118.exe 2280 0b756054e16a795f5796ee44ddb81a4e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b756054e16a795f5796ee44ddb81a4e_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2280 0b756054e16a795f5796ee44ddb81a4e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b756054e16a795f5796ee44ddb81a4e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b756054e16a795f5796ee44ddb81a4e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD573f84010494b1b9e4b478790bbd3d71a
SHA1136f73ff2ccb0ca4a558f7b72f8d9641bf7ee7f0
SHA25641a58310d5c51c6dea425a4dd7e79c7dea67be75915512990ac263ff8f6e02a0
SHA512e57eddfb249597151e09c4aebd9d2d77239ce677cd47d944202ed2a2a68af042c7b0a9725c366414300647d11c3bdafe3f163c065b8b6c89efa56fc764ac2966
-
Filesize
58KB
MD56fcfbc96bf5f5e265de9f2562449889c
SHA10c1554b206a19d8493f4c527a59d3e5294e2f333
SHA256383fac28159ba8589047985f7cfbbf3496f9d7f2088f8faffefd11c1dabdb5f6
SHA5121309dc0b701849509ad69cca80c5d054624fa212efd4bffa6e517328365d3695421c51d43e966e8a9199644a07eb6f13cb023f7d9b6e7cff4f9936cb18ef6f9b
-
Filesize
208KB
MD5b4dc5b89107d623135978726b2004c3f
SHA13d82e345bdfc52755fbab38c6f2ce31eb37ea4bb
SHA2565a98d4b7c1812eacd0db99afd76b3d0496ce790390e2c4c76517bfb93432551e
SHA5121e3b6f8e869c53c34965ab0cacbf2c1ac0efd1bea7fe14a147439abf0687fc0eab0d9581964be6215bf4a964d47b8d2365256a55386c0e89615079317096f651