Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 05:46
Behavioral task
behavioral1
Sample
55c6c3cc76e615683808076031df3714_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
55c6c3cc76e615683808076031df3714_JaffaCakes118.exe
-
Size
355KB
-
MD5
55c6c3cc76e615683808076031df3714
-
SHA1
2b91879734082665b22132f315d52d6f2ac64f78
-
SHA256
62dd1a3d575620a8f9ab07588e6bef6914846b431e9096dc23b372c2de26de0d
-
SHA512
1e6fc6db7815db751f337bc96cf9788e860c3939f223fa16d7bac840a2d01577ebf39f38ca74e2e40304ef530d80b41078afc866f8c80b2cae089d2b3b8d825e
-
SSDEEP
6144:Ks+0j3Is/YonP9FKPUWrELlXxhUy00Bbscrks0tV87ojr+aNTlNb:N+a3bAon3kUWANxhUXcbhRG+aNTnb
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1460-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral2/memory/1460-24-0x0000000000400000-0x00000000004F1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55c6c3cc76e615683808076031df3714_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1460 55c6c3cc76e615683808076031df3714_JaffaCakes118.exe 1460 55c6c3cc76e615683808076031df3714_JaffaCakes118.exe 1460 55c6c3cc76e615683808076031df3714_JaffaCakes118.exe 1460 55c6c3cc76e615683808076031df3714_JaffaCakes118.exe 1460 55c6c3cc76e615683808076031df3714_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
657B
MD578e9d2947e3562bb224ce42ce8402698
SHA1fadf04efc7e76d98ebfa5e2acb77ff6cfd2b8252
SHA2561a34fb5eb110a096cd2fb7a6440a9b10b0bc0a1b4b26fadc4d88b855b6ef46eb
SHA51231e780c5335d16dda774b9dcc0a801b174fd98b194e5a096ae600866128960cc6173123100a0a7888c3527d084e412436a783d9e503d0a2e2c5651ddbda08a63
-
Filesize
10KB
MD533a9e1a8dd5273f248023ae652ccbce2
SHA138914fe0ffebd889b36aff91e1ef24d1041aaff2
SHA2561f6a4f07348521633b9d3fd1fb754eebfdb4cea1900ede441661ddc702ad1c66
SHA512ac9d25cda993d2316109efc13f0344738a356480ac844ca0356ed5b8d8c57d9d7c4afa0aa3db881fa0119c4b08e9b0009b8aaf8b70f810f463dfc0be848b8d2f