Analysis
-
max time kernel
13s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 11:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
da46971aba3536ed3137f41519c40100_JaffaCakes118.exe
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
da46971aba3536ed3137f41519c40100_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
da46971aba3536ed3137f41519c40100
-
SHA1
a52093c797f4e7e583580d2102856c09fdd82ae3
-
SHA256
ec4ec4555fd0942152a1fb5eed92b5b4fe8b09e4088056318b0279f3e1c9ea14
-
SHA512
4fc13abc35b3adc567112c7b8b3820e40539c37f1c5c2defe5948708a6d41cf98f0e5afd1282d70e59ca72423c6eac04b563d51b334238c30b5acf002f5f1c31
-
SSDEEP
24576:9EI66/eNkTkS4mEcg0sit6NmcMCD+mdV5rIt94pyMqaW4EZfIs8lWQb0XbECo1eY:9p66nUO/sDLNUtLN7ZzY5wIBbGcTjbl
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2176-3-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-2-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-0-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-32-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-47-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-44-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-42-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-40-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-38-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-36-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-34-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-30-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-28-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-26-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-24-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-22-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-20-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-18-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-63-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-16-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-14-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-12-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-10-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-8-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-6-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-5-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-4-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-90-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-67-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-65-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-61-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-59-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-57-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-55-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-54-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-53-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-52-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-50-0x0000000000310000-0x000000000034D000-memory.dmp upx behavioral1/memory/2176-99-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2176-100-0x0000000000310000-0x000000000034D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da46971aba3536ed3137f41519c40100_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 da46971aba3536ed3137f41519c40100_JaffaCakes118.exe 2176 da46971aba3536ed3137f41519c40100_JaffaCakes118.exe 2176 da46971aba3536ed3137f41519c40100_JaffaCakes118.exe 2176 da46971aba3536ed3137f41519c40100_JaffaCakes118.exe 2176 da46971aba3536ed3137f41519c40100_JaffaCakes118.exe 2176 da46971aba3536ed3137f41519c40100_JaffaCakes118.exe