Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 04:00
Behavioral task
behavioral1
Sample
88e9daf32244982afa3750215fac91f4_JaffaCakes118.exe
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
88e9daf32244982afa3750215fac91f4_JaffaCakes118.exe
-
Size
202KB
-
MD5
88e9daf32244982afa3750215fac91f4
-
SHA1
57022636d91840b3a5d0f00271e92eee16e8a525
-
SHA256
799a99354ae19be381aa7904b8fee771f7dc9b61450644200865031a8044b16a
-
SHA512
ec36b086fd0b3bed7e0547fdae63d7bebe4a5d1069be31487dc4ae480e383c1b1eedd0205161fd08a502b09cd33d91c7381594a57bb7ed5fb209d0298a9eed81
-
SSDEEP
6144:HtgK5XrjIQoSdMgYinV5J3/D7TYjo7yfroSyzP:HtZ5wHM5lGDoSyzP
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2452-0-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/2452-1-0x0000000000400000-0x0000000000481000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88e9daf32244982afa3750215fac91f4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2452 88e9daf32244982afa3750215fac91f4_JaffaCakes118.exe