Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 15:12
Behavioral task
behavioral1
Sample
cfd1b815b48fab52caf6595eb723fded_JaffaCakes118.exe
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
cfd1b815b48fab52caf6595eb723fded_JaffaCakes118.exe
-
Size
15KB
-
MD5
cfd1b815b48fab52caf6595eb723fded
-
SHA1
56e6bb22d272f3939fb9abe5ed96ab5623fca678
-
SHA256
40e56406075374b036fffe0eb09f45af436e62567c325927206b555b2880d334
-
SHA512
aa37ce8fc612e7ce988e52687fc5c8e10838a0b27bd3e68ad5b0f17cf124a242e7516a968fe9ddc24c26f6c39bb1c56b8683ef2b5d320b24a5204366a1f45c2a
-
SSDEEP
192:V9Ssmq7dvR5dTVIhYVd/kp6ka+BdagyTutk6yowJL/XJ78G7ou7+wE0i5:V9YQd7Ihsvka+BsdTua6YJL/MuU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1072-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1072-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfd1b815b48fab52caf6595eb723fded_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1072 cfd1b815b48fab52caf6595eb723fded_JaffaCakes118.exe