Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 14:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
General
-
Target
fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe
-
Size
404KB
-
MD5
fbe9ab82af3ce628e5b92d05a351b67c
-
SHA1
394f938defcf77f3e23cae5d84b9693af04c2421
-
SHA256
201879c385f8d16ad512b02803ab4c1484983395bb1f6992b2634677a7ba8af2
-
SHA512
33b8bacda0d4eeb194dadeb7d53967a4568aca765bc04fb196e45fac1cc1c61d3d98b2251345b66f2c519729a09caebcae3c15cef62869dc32fc9fe954ef5699
-
SSDEEP
12288:ZiSC/HR++iLb0Be5Wqp7ssBlRwWW6o6da:miJJ7zBlRwSo6d
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2072 2540 fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2072 2540 fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2072 2540 fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2072 2540 fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbe9ab82af3ce628e5b92d05a351b67c_JaffaCakes118.exe"2⤵PID:2072
-