Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
555b04e18247114d663318132fe2919b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
555b04e18247114d663318132fe2919b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
555b04e18247114d663318132fe2919b_JaffaCakes118.exe
-
Size
20KB
-
MD5
555b04e18247114d663318132fe2919b
-
SHA1
dfde7f019b110d820d577cd96fc8d422a219075a
-
SHA256
f41afbd5f0694bc7dd4ef733e8328a02b586c629963a6b71cb8840bc60e7f19c
-
SHA512
79a96b4924ba2c26ac15e0b90adf965655ed02c815fd8811c6c42692f3b5fdf4ef687711039091eced8170862aa8a54fd567d0859cb51a04ed273c82f4484a50
-
SSDEEP
192:NWGIscAIyP2+v2paFWmL9irwT3Nsl7YZLf7Yj1oynE/qQ:v1cAIQv2pgxL/slwfs1W/5
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Iprip\Parameters\ServiceDll = "C:\\Windows\\system32\\niprp.dll" 555b04e18247114d663318132fe2919b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 555b04e18247114d663318132fe2919b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2072 555b04e18247114d663318132fe2919b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\555b04e18247114d663318132fe2919b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\555b04e18247114d663318132fe2919b_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2072