Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 00:41
Behavioral task
behavioral1
Sample
699a353a863f8067e3f0daf0ee72c041_JaffaCakes118.exe
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
699a353a863f8067e3f0daf0ee72c041_JaffaCakes118.exe
-
Size
674KB
-
MD5
699a353a863f8067e3f0daf0ee72c041
-
SHA1
dc57f3561d8f7c5bfc1ee83ff10ee35827556968
-
SHA256
c66a5923392a9ebde5357ac3d9e927e4ee58358b5f067a56dcdbae2c11240727
-
SHA512
9a4e94e274d6d25d98125e82baeb9ac65c8c34b4a5991bc7c95e69cc402344a3b4888ebb519be1fd6419416270508ea6a1a88faf92581675407a2096f3310a56
-
SSDEEP
12288:l4RIuUexGHGUjRMFW9G6nMTQ8Un8M+LVnRvE9Frgn4RmVE5OlnSoOkWzRqwiN:l4SuUmQGUqWbnyQNn8MGV34gVBlSoOkv
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2096-0-0x0000000000400000-0x0000000000579000-memory.dmp upx behavioral1/memory/2096-15-0x0000000000400000-0x0000000000579000-memory.dmp upx behavioral1/memory/2096-21-0x0000000000400000-0x0000000000579000-memory.dmp upx behavioral1/memory/2096-25-0x0000000000400000-0x0000000000579000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 699a353a863f8067e3f0daf0ee72c041_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2096 699a353a863f8067e3f0daf0ee72c041_JaffaCakes118.exe