Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 08:39
Behavioral task
behavioral1
Sample
d18636c872a67b19c102c8d2d4e725f0_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
d18636c872a67b19c102c8d2d4e725f0_JaffaCakes118.exe
-
Size
919KB
-
MD5
d18636c872a67b19c102c8d2d4e725f0
-
SHA1
03af17a2a30f1403ae575d57f269afffc2259191
-
SHA256
0eb9619358bff395929c25fbc66dd2502bf03be233bb02ef2edd85e43b8c6365
-
SHA512
e237b23418c0b0d7bfc66ab1130c7f1987cf7027bca751f5fca99649255160f21217582016ca4170d4b79e06d89e1c7932f7bd23debfe444ddf6be5348ef8057
-
SSDEEP
24576:sMIuUfj8ss2lhV1vyw/00TYAEYE1As2zz9oz:sxRfj8J2lH1v5bTE165Q
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2316-0-0x00000000000C0000-0x0000000000382000-memory.dmp upx behavioral1/memory/2316-1-0x00000000000C0000-0x0000000000382000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d18636c872a67b19c102c8d2d4e725f0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2316 d18636c872a67b19c102c8d2d4e725f0_JaffaCakes118.exe 2316 d18636c872a67b19c102c8d2d4e725f0_JaffaCakes118.exe 2316 d18636c872a67b19c102c8d2d4e725f0_JaffaCakes118.exe