Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
98583f8dd020c99738c5cccd0fc7bbc5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
98583f8dd020c99738c5cccd0fc7bbc5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
98583f8dd020c99738c5cccd0fc7bbc5_JaffaCakes118.exe
-
Size
128KB
-
MD5
98583f8dd020c99738c5cccd0fc7bbc5
-
SHA1
8fd3c23bf8e2537c4d466873452d0c02b911ec63
-
SHA256
5680e9b53c6caef9d67ca22db7adf5422f8d60248610db7d8b7fdbc0cfde34d2
-
SHA512
0e81046574d9d15e5bbe59f849b7afbe04a55e61b49a8b456f32ec97af7575233ad97292afeed90359be9ebaeb225e19cf4289424552d42683f4567556b43646
-
SSDEEP
1536:77L0M/W62DHSXlbsWsG6awZ0J7+xC8ZwvMx5TeEpxuTJWt:3YMQDHpWd6awcHeuTgt
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1iCwhRA7c_EWbH6n9IYfjB2XdDTlzRgWo
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Guloader payload 1 IoCs
resource yara_rule behavioral2/memory/3232-2-0x0000000002B40000-0x0000000002B4B000-memory.dmp family_guloader -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98583f8dd020c99738c5cccd0fc7bbc5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3232 98583f8dd020c99738c5cccd0fc7bbc5_JaffaCakes118.exe