Analysis
-
max time kernel
134s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 08:30
Behavioral task
behavioral1
Sample
734d657692e4f2c008e5c6ad8bcb00d7_JaffaCakes118.exe
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
734d657692e4f2c008e5c6ad8bcb00d7_JaffaCakes118.exe
-
Size
337KB
-
MD5
734d657692e4f2c008e5c6ad8bcb00d7
-
SHA1
3c67da808947dc1913e8af8c8f77a5fb1c0a93ff
-
SHA256
8c6512a34071952e0b3b42fe4cf4dab1aba1ae261cdbb7564588114f07d558be
-
SHA512
1350628eef08a9aa1b82fbcd82a85a062dbe660237f9b36790c8a976249df570040efd8fe9b02ff4d83916a5570b4ace0645badbe31ed2f5609970d4c46b0ac2
-
SSDEEP
384:gKkHY7t93KkL0jOOCjGVjr/LFvlaxr9r4jjlGCrSMEHMGus:gKfhhLwOOCjGh3pl0R4fYESFHMp
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5056-0-0x00000000003E0000-0x0000000000437000-memory.dmp upx behavioral2/memory/5056-2-0x00000000003E0000-0x0000000000437000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\secupdat.dat 734d657692e4f2c008e5c6ad8bcb00d7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 734d657692e4f2c008e5c6ad8bcb00d7_JaffaCakes118.exe