Analysis
-
max time kernel
131s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 03:52
Behavioral task
behavioral1
Sample
b201426d1cf65a4f663317d135697cf9_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
1 signatures
150 seconds
General
-
Target
b201426d1cf65a4f663317d135697cf9_JaffaCakes118.exe
-
Size
176KB
-
MD5
b201426d1cf65a4f663317d135697cf9
-
SHA1
76947b6d8dacfbad4647699f3c85a76b560e7eb4
-
SHA256
19a753e5b4a7d82b96442bb5594cd46088393280a6d9ab8a9d4884d5a758e27f
-
SHA512
8b7181ba06ca3f65330b6f5a4b5009d5e7e10661ebb96f2ce97a47dd13321a32cc720d6ef0acf9a6f46beb452d16a0b361334bc50f89857d9a6c07fed023347e
-
SSDEEP
3072:8QeE0JVwnDwdx7IBBN2yxh2Gc0mrPqm3YlXGpk9aEIit5o8HQo4vo:8bhHowdVIBBN2yxh2Gc0mrPqm3YlXGp0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3340-0-0x0000000000400000-0x000000000042D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b201426d1cf65a4f663317d135697cf9_JaffaCakes118.exe