Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 09:34
Static task
static1
Behavioral task
behavioral1
Sample
2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe
-
Size
170KB
-
MD5
2ec418620e9720e463cd2776f278c969
-
SHA1
845157d0ebd154425620c2194a2e7821279498e6
-
SHA256
6cfccf4cd316920955487d2f3f5933330ba2de9447cd75581c87340c55200d58
-
SHA512
5e73dfb252a458af9d8b270bb31af9246e9b37d3383e341f2a3e0b22146f7f0c8df0ed5ad5ae5166350ff7a8f837d5462cd0a0c9e493089bb3dd2b002cbb36a0
-
SSDEEP
3072:liuAI8rM3uL+YhgEWa1yGUzsOc3OpPiTXyIgFlLSDj:liuXk6sDWa1eYbZ2IS2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 524 2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 524 wrote to memory of 1592 524 2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe 84 PID 524 wrote to memory of 1592 524 2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe 84 PID 524 wrote to memory of 1592 524 2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe 84 PID 524 wrote to memory of 1592 524 2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe 84 PID 524 wrote to memory of 1592 524 2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec418620e9720e463cd2776f278c969_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1592
-