Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 03:53
Behavioral task
behavioral1
Sample
ba40a299a09a4810148c01d9f228334e_JaffaCakes118.exe
Resource
win7-20240708-en
2 signatures
150 seconds
General
-
Target
ba40a299a09a4810148c01d9f228334e_JaffaCakes118.exe
-
Size
40KB
-
MD5
ba40a299a09a4810148c01d9f228334e
-
SHA1
65b60eb847ffade13f6a17365a8ecddcb4537e2a
-
SHA256
1aee20279d1095441a798083869d7bf58a40c5aad905415ecc2b7ef9cf2e1150
-
SHA512
eda627ded6b83fb0fe1f1b88d3151c94e0f737d26087ae666e7b2fa2f8493d18ae9ed731a67c91af12f540a317891b7f23c197b29479f57af88b3274ae8375ed
-
SSDEEP
768:wfeESZPtwv57vmf9QDotPO/YhxIKivvi39vZQXNI1R8sv8:wfoZPtC57vmf9Q0tPO/YjI5UxQdI1D
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/536-0-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/536-2-0x0000000000400000-0x0000000000462000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba40a299a09a4810148c01d9f228334e_JaffaCakes118.exe