Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe
-
Size
404KB
-
MD5
29cdec3b30f291ae0c36c5868e758889
-
SHA1
438fea411a42a543e8c0ef423b07c6704daa5278
-
SHA256
81d3b2a5f1b6afa3a048660c1ccbd0dbd0119e32174f38c94658a612c254db80
-
SHA512
91eede49196fbeb0f1cc665401b14820be0e80e15aa4c577b54d99195596fec8808f85dedd7872f1b7033bff87ee757df65a7c2c63508683ba70b56ef385854b
-
SSDEEP
12288:qmfD229SUfK/lGRgOUqmq9kR6lhKXWB3a9FsqJKB57d8ff:qU22cMK/cRgOnmq9g63B36rKX6H
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3496 set thread context of 2740 3496 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3496 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3496 wrote to memory of 2740 3496 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe 83 PID 3496 wrote to memory of 2740 3496 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe 83 PID 3496 wrote to memory of 2740 3496 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe 83 PID 3496 wrote to memory of 2740 3496 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe 83 PID 3496 wrote to memory of 2740 3496 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe 83 PID 3496 wrote to memory of 2740 3496 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe 83 PID 3496 wrote to memory of 2740 3496 29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\29cdec3b30f291ae0c36c5868e758889_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
PID:2740
-