Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 11:08
Behavioral task
behavioral1
Sample
bb7a315873b52d8573e348b04a35d5ee_JaffaCakes118.exe
Resource
win7-20240705-en
4 signatures
150 seconds
General
-
Target
bb7a315873b52d8573e348b04a35d5ee_JaffaCakes118.exe
-
Size
372KB
-
MD5
bb7a315873b52d8573e348b04a35d5ee
-
SHA1
9a79de62377e2b4cbfa7763441e3c8b9ab3f81cb
-
SHA256
83e25bde93cc4bfa45718940a3f7d8d819ecc07d2425b1f0ef364c54f6a24694
-
SHA512
3718c07aa1eb73ae1bd58857c51057540a5391e7644f0af575e49531b43c2689a9fd0c0c36560ab92c9ef3a5e55f89a54d34b896f8113f7cd560ef4c40ca556d
-
SSDEEP
3072:CsxCcZ0IBSH9vOUlZm9nA4xiaXjQ7R+OixUBgAPAREN9DIRGu4jgC6w/uztDQIZ:C4FuNdWUrm9njIFySPU/C6w/sQI
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2524-0-0x0000000000400000-0x000000000045F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb7a315873b52d8573e348b04a35d5ee_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2524 bb7a315873b52d8573e348b04a35d5ee_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2524 bb7a315873b52d8573e348b04a35d5ee_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb7a315873b52d8573e348b04a35d5ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb7a315873b52d8573e348b04a35d5ee_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2524