Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 17:11
Behavioral task
behavioral1
Sample
bf12d70e212eb71df77ece3c21e69b31_JaffaCakes118.exe
Resource
win7-20240705-en
2 signatures
150 seconds
General
-
Target
bf12d70e212eb71df77ece3c21e69b31_JaffaCakes118.exe
-
Size
317KB
-
MD5
bf12d70e212eb71df77ece3c21e69b31
-
SHA1
79aec40cf67953278ba7ab0e4160237cbbc0adc7
-
SHA256
c6c1426c5b9238cff4fc0349d496a541453f591e7e724fb8a520c26b01b50c1b
-
SHA512
0c067a30043283dc02fdca648a38198028d575dd6bd45f86741b2c71118361c772fd3a85b2ab0c52b8168359a69dc7bb2fe49464496b58971b3999c130fcb226
-
SSDEEP
6144:uvQjX10MweIrmjLMtzVLybYyiVhgBGjkOODYQPDeNhaEhi:uYa4IrmjLijyiVrjkOODbeNhA
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2524-0-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-1-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-2-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-3-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-4-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-5-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-6-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-7-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-8-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-9-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-10-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-11-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-12-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-13-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-14-0x0000000000400000-0x00000000004E3000-memory.dmp upx behavioral1/memory/2524-15-0x0000000000400000-0x00000000004E3000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf12d70e212eb71df77ece3c21e69b31_JaffaCakes118.exe