Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 04:50
Behavioral task
behavioral1
Sample
d79b92f1166eaef053315c94c8b24a4d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d79b92f1166eaef053315c94c8b24a4d_JaffaCakes118.exe
-
Size
107KB
-
MD5
d79b92f1166eaef053315c94c8b24a4d
-
SHA1
62d1612c4f9bbdb60324236f0083fa97c64530ae
-
SHA256
f4a48f22b86d2f6d02f91a39c1bbb72bea98ab0495be8c3153392c8c8d44eb34
-
SHA512
38fb3a4642d4357c8871f495b414829f3e58419da9249cba76135caba2e53742c9c305aff1bfb22666bce1c2ce8a20beb25115bd61d2faa773c10f00c49b23e6
-
SSDEEP
3072:lSXHUiHV/0yf8DCHNVC7GXMUP5lfD7to91t4f6FsBhh0JS:lSX0G/0oqUP5/S1tLFsTh0JS
Malware Config
Signatures
-
ParallaxRat payload 2 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/116-0-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat behavioral2/memory/116-1-0x0000000000400000-0x0000000000424000-memory.dmp parallax_rat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d79b92f1166eaef053315c94c8b24a4d_JaffaCakes118.exe