Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 20:34
Behavioral task
behavioral1
Sample
c799ff318bc6f82df8b8d16732d1b058_JaffaCakes118.exe
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
c799ff318bc6f82df8b8d16732d1b058_JaffaCakes118.exe
-
Size
201KB
-
MD5
c799ff318bc6f82df8b8d16732d1b058
-
SHA1
fd04f8cb35caae79cfdca88d279b5a57da5294e9
-
SHA256
9006ec3479981c3c39763455a88ae5c740642f132817db3ef3a1631c762c6208
-
SHA512
84b4a7884d46060087ec1201ba5b33a39bfe1817bb9ba07fff7db27787538ed55f6dbdbb1ad77b2065d535a72406639e19549a829132870181ab5d661b85f9f3
-
SSDEEP
3072:1WHKAJfLy2q9UKf3MGCbN3o9IQz993rQHpfe4B7puwSYSEOWMdxHa1u4+rYbXiDQ:NAdyfcGCR3nQzT3rMt/Bd3kZHqu45
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/696-0-0x0000000000400000-0x00000000004AA4C5-memory.dmp upx behavioral1/memory/696-5-0x0000000000400000-0x00000000004AA4C5-memory.dmp upx behavioral1/memory/696-1-0x0000000000400000-0x00000000004AA4C5-memory.dmp upx behavioral1/memory/696-6-0x0000000000400000-0x00000000004AA4C5-memory.dmp upx behavioral1/memory/696-4-0x0000000000400000-0x00000000004AA4C5-memory.dmp upx behavioral1/memory/696-9-0x0000000000400000-0x00000000004AA4C5-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c799ff318bc6f82df8b8d16732d1b058_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 696 c799ff318bc6f82df8b8d16732d1b058_JaffaCakes118.exe