Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 10:04
Behavioral task
behavioral1
Sample
a65a9db9b119aa9265bdb2b81a750990_JaffaCakes118.exe
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
a65a9db9b119aa9265bdb2b81a750990_JaffaCakes118.exe
-
Size
196KB
-
MD5
a65a9db9b119aa9265bdb2b81a750990
-
SHA1
ee684d366e06998d4ff482377a331ba1d7a11b1b
-
SHA256
5b6784b5544a759e626cb52279850b4c42d87eeaf9b3c8452e818668cadaf76f
-
SHA512
c5bb89a928b4b3dd69b47bc732f9aca749579753f22c3ad420ee21f38fb1b047279cc3b6d6de0848bf7fceef3019eb70cfda2f058388b381c1ee457de35eb433
-
SSDEEP
3072:LCYum2RGPrjK0yPmKThIL1eA+PQkqLqgZhne1/+QjF3e4EVwdQ7pFTUnRU26Twon:WYuyh83IL1eXdu8xBndsF6oIPxjqH
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2220-5-0x0000000000400000-0x0000000000465000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a65a9db9b119aa9265bdb2b81a750990_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 a65a9db9b119aa9265bdb2b81a750990_JaffaCakes118.exe