Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 13:38
Behavioral task
behavioral1
Sample
JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe
-
Size
177KB
-
MD5
568df2b25d3865e7a8d6048ab08903a3
-
SHA1
f0503e2c1550eaec3aa7f281017710a576f56fd6
-
SHA256
1a41bc65d712b1fe51809df7f95ade6dbc32827b9eb12dc7de2fabaed584b990
-
SHA512
f53cea8e0aec576e46d0d2b35fd3d50df76e1aabda3a40bfe47feb8405859fc143ab10d70656f7dae57835ba362e976ef6123ea0562e247c486a002fce017db4
-
SSDEEP
3072:UbIlyZ87ry9I5FJpHiuuRF4EHfq9FcJaHatNim6ItkUoX/48AND:UbIlyErygJcp8KqvHHat7dtkUv
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\wi259434311nd.temp JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\MySomeInfo.ini JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2492 JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe 2492 JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe 2492 JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_568df2b25d3865e7a8d6048ab08903a3.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323B
MD5fdfed12f941aee724d46360e917458d1
SHA1ee1720d064a2ba82959878da2716036e9c3a4112
SHA2566469af4e89653c9ed40a15c5a6ab5e4e2eeab5b64e2f7d24fb26f13e0a834433
SHA512f48dab93ef02cedd1dd64666561a372a9917dc531729b0000995fccef72f54de0e33e80051801aa9ea554e9a87a2593c11b9578b8c8d17254346a4edb510bf17