Analysis
-
max time kernel
132s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 17:26
Behavioral task
behavioral1
Sample
b45ba8e9a906927be42c9d40cb2639f5_JaffaCakes118.exe
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
b45ba8e9a906927be42c9d40cb2639f5_JaffaCakes118.exe
-
Size
7KB
-
MD5
b45ba8e9a906927be42c9d40cb2639f5
-
SHA1
214823f413e1efc7e082183a2b6dff7bfe587f47
-
SHA256
2f30f52c8c08493df32f703a98faf2150506a1f107a1ab929c1043a4b22a9dca
-
SHA512
f403bc92ac34fc5713a0e61a88baae3ea8e2df45f0ba5fe20017223afe3c07bcf81c252b895b794665117f42d594df7245f5d358179f5828a0114ba547f3944b
-
SSDEEP
96:jI363Zes2WcXY2z4wOYVXs0tyhkaaRCDac6Ik5ItealWtgLyb:WMN2Wc5z4cVXs0tyzDluIt1lO1b
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2084-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2084-3-0x0000000000400000-0x0000000000409000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b45ba8e9a906927be42c9d40cb2639f5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2084 b45ba8e9a906927be42c9d40cb2639f5_JaffaCakes118.exe