Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 07:20
Behavioral task
behavioral1
Sample
aa180e08f8e1076a8797b5465417dcdb_JaffaCakes118.exe
Resource
win7-20240729-en
windows7-x64
1 signatures
150 seconds
General
-
Target
aa180e08f8e1076a8797b5465417dcdb_JaffaCakes118.exe
-
Size
623KB
-
MD5
aa180e08f8e1076a8797b5465417dcdb
-
SHA1
ba52b378e2982b024492593947b289251105dc5e
-
SHA256
6e7b8d402c84553463b352782fb506652ffae1bafdfdf0ea8de26580888db144
-
SHA512
b003709de6f58052254626cbdeec4c3677048560eacddbaeddd65a6cfaa2f16881000c287ec46a65d4667e91cb4a62b6b92d27630b6a94a0c813b860a7f3d151
-
SSDEEP
12288:UrnrGfXoe/xJlSzLgHzbTqz5kSoXtY9nGCT2Q+nWN9D9LOyYvjrEt:cGVxJlSnYbSvo90nQOFVOysHEt
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3352-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-2-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-1-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-3-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-4-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-5-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-6-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-7-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-8-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-9-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-10-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-11-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-12-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-13-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-14-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3352-15-0x0000000000400000-0x0000000000423000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa180e08f8e1076a8797b5465417dcdb_JaffaCakes118.exe