Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe
-
Size
73KB
-
MD5
566a16878c1a5e28cb870e12164e8ed6
-
SHA1
3a72c075d2126497b7f55b0527d698ae5d745757
-
SHA256
a645e8213f8ff9c56d6b339872ce8889fa3bb0200dd9badc78a2ad6e41656340
-
SHA512
12ca131cb27ebc9ebbcc6f023b93ee482938256b6fd7acb70fd73ff0c0b686d060f50e059a5cfb5eb2f8d63df50feed6b71a6af22a7a4c9d4a3d0fa7ec270a20
-
SSDEEP
1536:SFJGvld8TaQjxMH0EgJdkqeAXErPjDehI334vWx:6Jaqa2/DEzV3IOx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2288 2516 566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe 28 PID 2516 wrote to memory of 2288 2516 566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe 28 PID 2516 wrote to memory of 2288 2516 566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe 28 PID 2516 wrote to memory of 2288 2516 566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\566a16878c1a5e28cb870e12164e8ed6_JaffaCakes118.exe" 27128263593029599722⤵
- System Location Discovery: System Language Discovery
PID:2288
-