Analysis
-
max time kernel
96s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 14:44
Behavioral task
behavioral1
Sample
3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe
-
Size
71KB
-
MD5
3a93480532ecc9b7cf94e853d9c0d84a
-
SHA1
1ddafde7e747a8fa8a928e15f7d8d29b22e6b493
-
SHA256
b6ebb3ab434d14041072ff81bb76b9bb22767f65a5a47f55e9eab0fce0421949
-
SHA512
2f5d29a61b2092e220ad0b6111f5c026bd476ecd396698d39b788fc7531a57fda9110c5db95edd6df87d2438dda0c0619d588e43c12002343aa9987e86d79148
-
SSDEEP
1536:tt5ZdeHwm9GASGAvOu5BqBmRiB7BDomPQubupRbx/KU8xi:t7veCAS/Ogzixbo3
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1544-0-0x0000000000400000-0x000000000041A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1544 3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1544 wrote to memory of 3780 1544 3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe 84 PID 1544 wrote to memory of 3780 1544 3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe 84 PID 1544 wrote to memory of 3780 1544 3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe 84 PID 1544 wrote to memory of 3780 1544 3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe 84 PID 1544 wrote to memory of 3780 1544 3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a93480532ecc9b7cf94e853d9c0d84a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3780
-