Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe
-
Size
85KB
-
MD5
2aedd1c2df2380dad26ee31aa74a3390
-
SHA1
76c000adcf57b1675198749490439aa29008a405
-
SHA256
3c459431c3679fce67c1def78f69f9ad2cf9444a735de30c2d7388792d51d7c8
-
SHA512
1c18af09be55db800e2b38b1981ece221303a81804457b37fe26c89f2166f7c1cb84cbf4d6016234a3c773806dd7d04ed3b97ae7cb1b5a50c18c0244119caf1a
-
SSDEEP
1536:vjI4Sz0MVgnvOCbpD5gIF6f7LjgmQOR2Z:67+nJbJ5B6f7HVqZ
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2728 set thread context of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 2092 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 2092 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2092 2728 2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\2aedd1c2df2380dad26ee31aa74a3390_JaffaCakes118.exea|2⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2092
-