Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe
-
Size
249KB
-
MD5
12df685fac98f94855b7accd118ff0b4
-
SHA1
3358bac3b670cefd61e8d6b27cb67449b1269ade
-
SHA256
dc465a16c2b5f415b4f71fbb8ebad5946b8c5e749cbd8520877deb57b3db3952
-
SHA512
595651202c4b448b4cf76103e48b45609f56abd458e88e2f4b2daf35ec2273cc066badab507e1168fa89b052d452e419690e0a285aa37a28e2b76b12151ceedf
-
SSDEEP
6144:PSiApUP12Q/Ilr7ZjcEucx9Osv687yWgS:6QngNVYE2Q
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2792 set thread context of 2588 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 2576 AcroRd32.exe 2576 AcroRd32.exe 2576 AcroRd32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2576 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2576 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2576 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2576 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 31 PID 2792 wrote to memory of 2588 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2588 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2588 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2588 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2588 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2588 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2588 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2588 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 32 PID 2792 wrote to memory of 2588 2792 12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\259445075.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\12df685fac98f94855b7accd118ff0b4_JaffaCakes118.exe2⤵PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5e739b459cb2e603e0d00af5239f53dee
SHA19e0dd72c06cdd27947c8ed91c23ab1ea4cd2fb25
SHA256e01a6cb6c69b2ca73a915066c054c82ad11978be21749cb1fc96db51403a3835
SHA5125f15c472dd64e890774aee4834437dec5327beb56c104bc26a6682919874c74b97ec226315297f2f7d41c8715025cb621e50985ccec1fd5b1cc0bb6aa3531a5f
-
Filesize
3KB
MD56c12e6177de9423be419f215306c928a
SHA1e94305c47d2ae14b4db0b30d84d4e148c91decc8
SHA256203d40582d1c70d6df7925a74a0eb8f4fa20857b3415b4bf0e8aabe50bad9e61
SHA51207b9ef34fc1c4612f3dca4a7fce7cc2213d721d137e3cc8d927075e54ab8f8e508e6e3476f72df0de26498bd3f95231f29bc36ddee4e4333700e83ffdeeeb2cc