Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 23:40
Behavioral task
behavioral1
Sample
JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe
-
Size
1.6MB
-
MD5
68eb8417c44d2d2ffd91ebc7c90a6e56
-
SHA1
6bfe05992a9fa74497f2605f10ee916ddeff3c20
-
SHA256
49873ad763eda450951592295dbdf39d1327c07f1097875350899e028da72bd3
-
SHA512
4b5c0fa67f820854d28eef365266c848d41dd563166675afba34df58b996a11a5d217b2799d25f7cfe7d2229e0af47816a16407d360a8c27823958c3693d992d
-
SSDEEP
24576:aCs+zeAQ6Zx9cxTmOrucTIEFSpOGEsAQ6Zx9cxTmOrucTIEFSpOGEl:1ZeAQ/TD5EOqAQ/TD5EOn
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2092 set thread context of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30 PID 2092 wrote to memory of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30 PID 2092 wrote to memory of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30 PID 2092 wrote to memory of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30 PID 2092 wrote to memory of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30 PID 2092 wrote to memory of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30 PID 2092 wrote to memory of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30 PID 2092 wrote to memory of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30 PID 2092 wrote to memory of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30 PID 2092 wrote to memory of 2516 2092 JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68eb8417c44d2d2ffd91ebc7c90a6e56.exe2⤵PID:2516
-