Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:24
Behavioral task
behavioral1
Sample
9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe
-
Size
357KB
-
MD5
9f08c191bf98e6c141f3d0e9b8910cab
-
SHA1
75a4d063b1aed19b34506951135747c1cb7ec4fe
-
SHA256
b0eab48bee817bb09faddd069244096ea5993125fc88635c2b4ae5a26523a518
-
SHA512
a803dc5f8ccd5bf037199b7455b4ae39a6b3dcb6af7dcca6f462fa1a4fd38487470b56fadb81a96375b049cea4f28816741c5ae2e9b1cfc0bc7fa484dd8b2ff4
-
SSDEEP
6144:d8yZw0EMTNHw7Ip+rKUEqpjyfe03qJf1zw4T/+8zXTfwcDKl+oSU9:6Z0btw6+rK5qkfe03j4j+cD4choSI
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2384-0-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral1/memory/2384-17-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral1/memory/2384-18-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral1/memory/2384-24-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral1/memory/2384-25-0x0000000000400000-0x000000000050A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe -
Processes:
9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main 9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exepid process 2384 9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe 2384 9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe 2384 9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe 2384 9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe 2384 9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe 2384 9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f08c191bf98e6c141f3d0e9b8910cab_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD565c764fff2de78d44921b206091acca5
SHA1651a084f444b8318ac260f0e116b53c7ab453ddb
SHA2562f655fb654fb9432d033bda858fb91d67d9361cdd49a9634aa5b4abc662aa57c
SHA512cc02016ecedb58a3494e2b4159e68e25f95c45fc92a95737847e48bd0459833ece729a6648c5ff82ddfe0b85f57eb1ef3fef951764f40715eda0aca3f39caa2d