Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 16:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe
-
Size
938KB
-
MD5
43136785ec2d4dd0a1cd8e8e85503af9
-
SHA1
4299e5e18caaf89f763ef9a8266abec4b6cb80a8
-
SHA256
74782a5a2f61e2c17ce38d42e181263b22945ec1a6d475804d775ef7a240e738
-
SHA512
8fe08134759d5f08c73c6c554e95c18ccef8426a30ea30a466c6207856293358aca17db3ce2f7c0737dc12791b62894b6a76029443003f0b712e5d85e0b9a993
-
SSDEEP
24576:NBaIIV6Jyt2HVkdro4M3gx7fMxtfAqNn:XJG2ian
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 388 set thread context of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 388 wrote to memory of 2352 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 31 PID 388 wrote to memory of 2352 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 31 PID 388 wrote to memory of 2352 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 31 PID 388 wrote to memory of 2352 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 31 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32 PID 388 wrote to memory of 592 388 43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43136785ec2d4dd0a1cd8e8e85503af9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵PID:2352
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe2⤵PID:592
-