Analysis
-
max time kernel
134s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 20:24
Behavioral task
behavioral1
Sample
711891fbc0f184848c2687843b454489_JaffaCakes118.exe
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
711891fbc0f184848c2687843b454489_JaffaCakes118.exe
-
Size
29KB
-
MD5
711891fbc0f184848c2687843b454489
-
SHA1
d915baf050127ee4eeb2209edd4cc27e35ecc921
-
SHA256
a296afcb2d7b53fc2933abc674cae4e1de839535d7e6fc14be8f760e497dfb4f
-
SHA512
1dcb017fc35d1667e5492ec1d959e2f90faac3ff9a2ae4953a24d911f0508c214e7a86421b1d1040c8ca6946cc0ca0e67bde0e2bb9d1061dc3e6a77691b96775
-
SSDEEP
192:V0B9v3gCBhgMndOPS63SW7DOEFBxDUhHkuq/7MjUPYz:g9YCEMdct35DO63eH1sIMYz
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1900-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1900-3-0x0000000000400000-0x0000000000409000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 711891fbc0f184848c2687843b454489_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1900 711891fbc0f184848c2687843b454489_JaffaCakes118.exe