Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 15:57
Behavioral task
behavioral1
Sample
JaffaCakes118_98dfe7079947670467af8248385ca27b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_98dfe7079947670467af8248385ca27b.exe
-
Size
364KB
-
MD5
98dfe7079947670467af8248385ca27b
-
SHA1
fd45ea4657678df2ef80ab62f7e2829801601c2c
-
SHA256
4ddede4472df59b5581371d0d83e55d184da9df457b3bfc0633477c56ae7ea06
-
SHA512
567376c0dbe6b514fbabb2cd5fd3942db96abfffffd73fd69f384474dac29680748fa8f7e1d90af2d61f4d33ebeb81a120d05d8dff0250a5ea0c89a517823d80
-
SSDEEP
6144:gxJ61E0Fg0C7pzNZT3KUDEeuH4RU0yDaytuxcz7TPUhKuh91RpPaYoSMKV:gxgvC79NZTaGuwiuxu7Tkf91RpPdoSjV
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3756-0-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral2/memory/3756-10-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral2/memory/3756-11-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral2/memory/3756-12-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral2/memory/3756-13-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral2/memory/3756-14-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral2/memory/3756-15-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral2/memory/3756-16-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral2/memory/3756-17-0x0000000000400000-0x0000000000519000-memory.dmp upx behavioral2/memory/3756-19-0x0000000000400000-0x0000000000519000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98dfe7079947670467af8248385ca27b.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3756 JaffaCakes118_98dfe7079947670467af8248385ca27b.exe 3756 JaffaCakes118_98dfe7079947670467af8248385ca27b.exe 3756 JaffaCakes118_98dfe7079947670467af8248385ca27b.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581B
MD535890502abed4e50ad9e2a77752876c1
SHA1b4e5e207963dc77664011d5fe3c6a9b71dad665b
SHA256f8f74b16d3010991b0e55b5eb3f5baa3d83a1f29d3954a00831f442974c0133e
SHA512825825512cdeffbe78b063320ccf5277318d557e6e1ffd5034af49fb3aa9a341ad7bbf210e394aa1be27b21cfc6d07392e48416195972076f1ba0416cce17da0