Analysis
-
max time kernel
141s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 00:15
Behavioral task
behavioral1
Sample
bfb9c48009d2831f65fb53ca7e6c9129_JaffaCakes118.exe
Resource
win7-20240729-en
3 signatures
150 seconds
General
-
Target
bfb9c48009d2831f65fb53ca7e6c9129_JaffaCakes118.exe
-
Size
333KB
-
MD5
bfb9c48009d2831f65fb53ca7e6c9129
-
SHA1
6964707a7dddf15f3978d72af24375ed348c5ea5
-
SHA256
1c9dfca121a556a5ff2fb48f0f8dc9c5481af481269c360d2b9d62a0d7c40651
-
SHA512
0cff77bffdceb0b6d5c22faef9568496de0284b393ee6dc2ff79e6a9fe877c5e3291ed660a5f3ae05fa5bcfe33acb5ae468800aaa5568c914a9791c8e622e5e7
-
SSDEEP
6144:9M9gYVVn0lKwDRMLuFSdR4pANa7fWn63wNszomdwfTGaGu80AwyF3f1vmoS:C9gQ+lXtDAWpASWHfmY9ZAn3AoS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2536-0-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-1-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-2-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-3-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-4-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-5-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-6-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-7-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-8-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-9-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-10-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-11-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-12-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-13-0x0000000000820000-0x000000000093B000-memory.dmp upx behavioral1/memory/2536-14-0x0000000000820000-0x000000000093B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfb9c48009d2831f65fb53ca7e6c9129_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2536 bfb9c48009d2831f65fb53ca7e6c9129_JaffaCakes118.exe 2536 bfb9c48009d2831f65fb53ca7e6c9129_JaffaCakes118.exe