Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 01:42
Behavioral task
behavioral1
Sample
bdc4ebf2b38c06b09ddeb712e5538b76_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
bdc4ebf2b38c06b09ddeb712e5538b76_JaffaCakes118.exe
-
Size
6.4MB
-
MD5
bdc4ebf2b38c06b09ddeb712e5538b76
-
SHA1
93b9607bb9a8f4373d4cdb98ca124ee208e8b22b
-
SHA256
0c491ae73a9bd8799d457a0f545557360426285b31c16003aeb93612d0238ad2
-
SHA512
a18ce3bca797a65af633b6f0386f2096993b0e2eb0eab22d5c2698dbfc8bc53430b51bd3e2b7cf5f39519857a1de4ac98d9376fd65cbc727f3ef22f50a3120ae
-
SSDEEP
98304:TmoLf274D3j1hrm581Cucwn7Zvr+6cPPWiyw+P1xhyyCyyyqLouyLcBKSNlTyP8S:TjS8DT1Bm2YuckfwC1x82ccSNqsHPk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3632-0-0x0000000000400000-0x000000000106D000-memory.dmp upx behavioral2/memory/3632-1-0x0000000000400000-0x000000000106D000-memory.dmp upx behavioral2/memory/3632-3-0x0000000000400000-0x000000000106D000-memory.dmp upx behavioral2/memory/3632-6-0x0000000000400000-0x000000000106D000-memory.dmp upx behavioral2/memory/3632-7-0x0000000000400000-0x000000000106D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdc4ebf2b38c06b09ddeb712e5538b76_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3632 bdc4ebf2b38c06b09ddeb712e5538b76_JaffaCakes118.exe