Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 15:57
Behavioral task
behavioral1
Sample
JaffaCakes118_98dfe7079947670467af8248385ca27b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_98dfe7079947670467af8248385ca27b.exe
-
Size
364KB
-
MD5
98dfe7079947670467af8248385ca27b
-
SHA1
fd45ea4657678df2ef80ab62f7e2829801601c2c
-
SHA256
4ddede4472df59b5581371d0d83e55d184da9df457b3bfc0633477c56ae7ea06
-
SHA512
567376c0dbe6b514fbabb2cd5fd3942db96abfffffd73fd69f384474dac29680748fa8f7e1d90af2d61f4d33ebeb81a120d05d8dff0250a5ea0c89a517823d80
-
SSDEEP
6144:gxJ61E0Fg0C7pzNZT3KUDEeuH4RU0yDaytuxcz7TPUhKuh91RpPaYoSMKV:gxgvC79NZTaGuwiuxu7Tkf91RpPdoSjV
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2312-0-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-9-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-10-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-11-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-12-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-17-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-18-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-19-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-20-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-21-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-22-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-23-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-28-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-29-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-30-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral1/memory/2312-35-0x0000000000400000-0x0000000000519000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98dfe7079947670467af8248385ca27b.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 JaffaCakes118_98dfe7079947670467af8248385ca27b.exe 2312 JaffaCakes118_98dfe7079947670467af8248385ca27b.exe 2312 JaffaCakes118_98dfe7079947670467af8248385ca27b.exe 2312 JaffaCakes118_98dfe7079947670467af8248385ca27b.exe 2312 JaffaCakes118_98dfe7079947670467af8248385ca27b.exe 2312 JaffaCakes118_98dfe7079947670467af8248385ca27b.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d7a5c2fb6de9716308ceecf434db05ee
SHA146cbd386eae4837d771154f7d2c1e419d6dc2eee
SHA2561b1e8610b251a853842eb71c4f89d93892b367e61ddf3aa6430d01491e5624df
SHA5124656fe28f18d4e0959f519f8b010df05fe9c5be91e62be3e79f12b0fdff51ef21c1bea6ca49c461007b0e08fe857743255a295b584fd21854c5ca04ca81dadc9
-
Filesize
581B
MD535890502abed4e50ad9e2a77752876c1
SHA1b4e5e207963dc77664011d5fe3c6a9b71dad665b
SHA256f8f74b16d3010991b0e55b5eb3f5baa3d83a1f29d3954a00831f442974c0133e
SHA512825825512cdeffbe78b063320ccf5277318d557e6e1ffd5034af49fb3aa9a341ad7bbf210e394aa1be27b21cfc6d07392e48416195972076f1ba0416cce17da0