Analysis
-
max time kernel
101s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
306e452b6d38f50d27ba67800c60e568_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
306e452b6d38f50d27ba67800c60e568_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
306e452b6d38f50d27ba67800c60e568_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
306e452b6d38f50d27ba67800c60e568
-
SHA1
b3aaeb1bf31e27eb6268f0ada42ead948cc6ac8c
-
SHA256
ed8c1dc4103f3665d3fb7b1287aab17fb9d8a4aefb6299210a96cebea0919369
-
SHA512
a6a05643447d213f08b45fcaed67867b6885b5442b39b6383220e2d33554206818584405cb7198171b64ec2f13e7538227fce209010839f9ee1df9af3152e9de
-
SSDEEP
24576:52LgO5wdEN36jhlolpg4Zn8ulOOiOw7LuHoxoJGT0LfxaLXEtnnC+9tavw:5W5wdENSlKn8ulOO9w76IxoIALILsCAR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 306e452b6d38f50d27ba67800c60e568_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 108 306e452b6d38f50d27ba67800c60e568_JaffaCakes118.exe