Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe
-
Size
43KB
-
MD5
1581d0783fdd00bd0d75b3729db6dcb0
-
SHA1
8d6add23d4b0911abd4491bb7d363e7a09ed6add
-
SHA256
1624423ff04ac98f2cdbc56317226c03d54ed944cbe2e60225b1e0947b6ae66e
-
SHA512
c8ae91601da867b6846f675d85875c049ec784e696c60c9e356b56852f9571c97c35e1b256eb613458fff723dfabc72294b16727f49d39aee0a280db67a49158
-
SSDEEP
768:DhyQcJ+Lx5ioZqqSPoFjoTCA2fRoSPRzNCPw7tor45URK61VpHmSn9Fq:D8Qcgx3qhPomG5B9gPw7v5QKeV4Sne
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 2520 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 2520 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2520 1724 1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\1581d0783fdd00bd0d75b3729db6dcb0_JaffaCakes118.exea|2⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2520
-