Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 18:21
Behavioral task
behavioral1
Sample
100d1004076b6abc11e74580fbf6f128_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
100d1004076b6abc11e74580fbf6f128_JaffaCakes118.exe
-
Size
300KB
-
MD5
100d1004076b6abc11e74580fbf6f128
-
SHA1
5f376cc30b155c1a33765546d5e90bb59794114e
-
SHA256
a33344111c2015644a5951af18b00608132f9001a17470f5fcb62eeddcbeab27
-
SHA512
10707b7902d8ce98a4975bc1481f89c0ac709273f38e2a214b87130f258ce0196f47baa2cebcea502d57326e67a5a96e428e18fc183b9c0d5ab7e76494fd6433
-
SSDEEP
6144:vCxOET2PRA8A3bLeQh81uhTx8+WYbwWVJqjhLzgAmw7VFyJ4IW6:v1PO8MeQh81uhNmq+jhfgKBCy6
Malware Config
Signatures
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2644-2-0x0000000000400000-0x00000000004BE000-memory.dmp autoit_exe behavioral1/memory/2644-3-0x0000000000400000-0x00000000004BE000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/2644-0-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2644-2-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2644-3-0x0000000000400000-0x00000000004BE000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 100d1004076b6abc11e74580fbf6f128_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 100d1004076b6abc11e74580fbf6f128_JaffaCakes118.exe