Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:09
Behavioral task
behavioral1
Sample
28f12d96e68f7796ce8ebb9233e3e7da_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28f12d96e68f7796ce8ebb9233e3e7da_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
28f12d96e68f7796ce8ebb9233e3e7da_JaffaCakes118.exe
-
Size
19KB
-
MD5
28f12d96e68f7796ce8ebb9233e3e7da
-
SHA1
b3183e1add68ec447f62cb926bd00f2314d5ac14
-
SHA256
30656d0b61619b3f607f4be25f868b3eddf9e762f4d56c36dd8abefdc7f53528
-
SHA512
83b1b00c17142077a90fbfe9c45efe7a2c51e71aa8d433f296a0f79f0c678747f3e9bd79846a96e48731ce47bb9e8b47016a6b27da5b43a3268987e332d2a71c
-
SSDEEP
384:HVuGrlb3fkrj/mKs/DiXzjygdsiuGTVKkkRbLUwiq7DA9sY+ms+:MClrkrU/8zjWT6KkkRPUwiqHA2Y+m
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Systems = "C:\\Windows\\system32\\spoolsvc.exe" 28f12d96e68f7796ce8ebb9233e3e7da_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\spoolsvc.exe 28f12d96e68f7796ce8ebb9233e3e7da_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\spoolsvc.exe 28f12d96e68f7796ce8ebb9233e3e7da_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1236-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1236-3-0x0000000000400000-0x0000000000416000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28f12d96e68f7796ce8ebb9233e3e7da_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f12d96e68f7796ce8ebb9233e3e7da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28f12d96e68f7796ce8ebb9233e3e7da_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1236