Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 02:53
Behavioral task
behavioral1
Sample
82c606e579368e83257e4de564bbabd6_JaffaCakes118.exe
Resource
win7-20240704-en
2 signatures
150 seconds
General
-
Target
82c606e579368e83257e4de564bbabd6_JaffaCakes118.exe
-
Size
690KB
-
MD5
82c606e579368e83257e4de564bbabd6
-
SHA1
dccabdf970ed64502e450af7543f9916155e0ed0
-
SHA256
919c9c2de73da9977664c782459029a2b2c6515e5d815abab990a89b347bb94c
-
SHA512
55be3f210fb3cb776fc35485a0c6a64525feec4c9ee97082ab3a1abdcad721db0308349587705d5e9bb345a1f1ef28e70c55699b7986056ed91afc808689bf0a
-
SSDEEP
12288:f6lyTAA7F9ZVLVGZrHKJrRTPT3d5W7JyBqw5oa6544V7LNN7vfc:ygTACzjRG0ZLwbw56V9K
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/912-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/912-1-0x0000000000400000-0x0000000000415000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82c606e579368e83257e4de564bbabd6_JaffaCakes118.exe