Analysis
-
max time kernel
140s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 23:54
General
-
Target
JaffaCakes118_b2f6715e2405f5f7628a54aea28c90ce.exe
-
Size
830KB
-
MD5
b2f6715e2405f5f7628a54aea28c90ce
-
SHA1
03597ce1962c2285ada463b8fb4c46daf9acf97d
-
SHA256
960055147232327028fe5468d1fd6b221f74f228dcf45d75f68a495ee534842d
-
SHA512
6633474a4d55c9c4996fa30c25c31ff734f9d3eec68b9f3988b1dcef60cdac9791576de2ded4563ba294c5e0c80b8a8e0c43658deff891af30bb477441c1e7ef
-
SSDEEP
24576:4gUOGuCR3scwwKIU8UEKTBgpioRaeTpzWKcMOD5:2wCdscACUEKTBgpNYeVzWBM
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/5692-0-0x0000000000400000-0x00000000006B4000-memory.dmp upx behavioral1/memory/5692-6-0x0000000000400000-0x00000000006B4000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b2f6715e2405f5f7628a54aea28c90ce.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5692 JaffaCakes118_b2f6715e2405f5f7628a54aea28c90ce.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 5692 JaffaCakes118_b2f6715e2405f5f7628a54aea28c90ce.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5692 JaffaCakes118_b2f6715e2405f5f7628a54aea28c90ce.exe 5692 JaffaCakes118_b2f6715e2405f5f7628a54aea28c90ce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b2f6715e2405f5f7628a54aea28c90ce.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b2f6715e2405f5f7628a54aea28c90ce.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5692