Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 08:47
Behavioral task
behavioral1
Sample
b70682f83a6f59ff2aaea7af3ec56b14_JaffaCakes118.exe
Resource
win7-20240729-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b70682f83a6f59ff2aaea7af3ec56b14_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
b70682f83a6f59ff2aaea7af3ec56b14
-
SHA1
2b0b93206d95b1087ed9041d60ffa5a99115a48c
-
SHA256
e14ee9230f60e6166e6d7d54667affa0f1d402cea882d1552fb0edfa498acbda
-
SHA512
98cea43eb7590c9d2e4e9c549e7f8d11fa0c38e607028c8dbabe6342f618e43eae94d58b8a6d85a3a61a314daad74aac105edc30570dcfa2301b58b1555becbf
-
SSDEEP
24576:Ql0GTHyBhZOTSX3tnegiNhJbtZa2PfrD26YUok5Qt5CaO0u21I3V08YYk:Ql/THyBjtegiHZt82X/26YUCzdsYYk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4248-0-0x0000000000400000-0x0000000000582000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b70682f83a6f59ff2aaea7af3ec56b14_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4248 b70682f83a6f59ff2aaea7af3ec56b14_JaffaCakes118.exe