Analysis
-
max time kernel
50s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe
-
Size
168KB
-
MD5
9778eefebb772dec4b5dbcb5f79ae4e8
-
SHA1
7cdc2e29ddf95b7128a3b4fa1aa0e9ece24a2fcb
-
SHA256
0d9fec3fda6a97314c02322da85c1ea644176a081909705dd5077687529db265
-
SHA512
d6878585cc87bf99d6ea8cf5e36fe1046dabdd6e6b1a3d84b02c7819136743f47d5ddfafb307616851ecd081f7847b95507e887a342bda4973ba10df7dd01e0a
-
SSDEEP
3072:UJ4fZ3uUKkqryO6A8ds0L23IVfpkxQBbqAKFep3Ptiuyl2+H+6D/3ygweDzV:cr+d1VCxQBbqz4pa+6DTV
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Sality family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1704 set thread context of 2148 1704 JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe 29 -
resource yara_rule behavioral1/memory/2148-17-0x0000000000520000-0x00000000015AE000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1704 JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2148 1704 JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe 29 PID 1704 wrote to memory of 2148 1704 JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe 29 PID 1704 wrote to memory of 2148 1704 JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe 29 PID 1704 wrote to memory of 2148 1704 JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe 29 PID 1704 wrote to memory of 2148 1704 JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe 29 PID 1704 wrote to memory of 2148 1704 JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe 29 PID 1704 wrote to memory of 2148 1704 JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe 29 PID 1704 wrote to memory of 2148 1704 JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9778eefebb772dec4b5dbcb5f79ae4e8.exe2⤵PID:2148
-