Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe
-
Size
128KB
-
MD5
660f8f4724261c9041f71492a8efd119
-
SHA1
59440446f12db2a37a1159d89b7ccc4aaf3ef39f
-
SHA256
b58d059d4b24f4d72d1b9e5f8da137e9445154f35ec46fae8dd3db2a736dd74e
-
SHA512
a105e7d3b8593c600729ea5442878e67233fcec5509ad380e7ad114dae03d58a5b76d4835ae973713a4daba1827bd88aed4ef59b80d5a70de6c4d7fb46b5fe62
-
SSDEEP
3072:uGHi6mw6fjNHsXJNYxHWPKBV4ENNCDjraVDAEmJI:+ZfjOXJSxH54ENMjr+DAE
Malware Config
Extracted
pony
http://67.215.225.205:8080/forum/viewtopic.php
http://216.231.139.111/forum/viewtopic.php
-
payload_url
http://ftp.approachit.com/jZy.exe
http://atualizacoes.issqn.net/FhPD.exe
http://tokulances.sitebr.net/jV1.exe
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2260 2904 660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2260 2904 660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2260 2904 660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2260 2904 660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\660f8f4724261c9041f71492a8efd119_JaffaCakes118.exe"2⤵PID:2260
-