Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 00:30
Behavioral task
behavioral1
Sample
71e3415b52bdfbed6c71445f682c313c_JaffaCakes118.exe
Resource
win7-20240704-en
2 signatures
150 seconds
General
-
Target
71e3415b52bdfbed6c71445f682c313c_JaffaCakes118.exe
-
Size
279KB
-
MD5
71e3415b52bdfbed6c71445f682c313c
-
SHA1
f12462670cbbc4436221fe84262da472d61306aa
-
SHA256
3f9f1df3bb94bee1f2fc6bf9d8b7c922a14a591fb26407e6e3cef5a89d2bc716
-
SHA512
900fa259645cda147320c03ef4507da43cb9803e44bca526c68f7dc049659262361dee2fcfd1179885a32638374d743062ebbc1bb6f30630143e5f1a74466569
-
SSDEEP
6144:u2dMQRMR0FZXpGPL840CRGlnQPUiRaDLBNv7Hgx9fCN7fF:kQR1HconQUiiNvz2Z4
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2028-0-0x0000000030000000-0x0000000030086000-memory.dmp upx behavioral1/memory/2028-1-0x0000000030000000-0x0000000030086000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71e3415b52bdfbed6c71445f682c313c_JaffaCakes118.exe