Analysis
-
max time kernel
140s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 15:50
Behavioral task
behavioral1
Sample
e083644d1b0058f20f9e8acab403d090_JaffaCakes118.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
e083644d1b0058f20f9e8acab403d090_JaffaCakes118.exe
-
Size
7KB
-
MD5
e083644d1b0058f20f9e8acab403d090
-
SHA1
fdd4c833f0ad26d0edca041cc9c5adf4d881b7d9
-
SHA256
b9589ab7fcf1d13de8e2038e224ccb3a924f98163f08b8690c12ff68e97bd4e1
-
SHA512
6ca2a82bfbd410f950cb9592717f6350195cc1a939deedea968be07ee35c8f1c0a4a2926407056498575d856a2e95a20f942198ebd9ca7d0ced2d1dbdec29b25
-
SSDEEP
96:Bgyk/cZmLlBOqZQShgFGH4h/8T5iw55lLh4J+szMOphZv4N+csb7P/6Nz9tj:2yacwTuGH4dcbLlLCIij4N+HPCzLj
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2984-0-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2984-1-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2984-2-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2984-3-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2984-4-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2984-5-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2984-6-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2984-9-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2984-10-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2984-15-0x0000000000400000-0x000000000042C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e083644d1b0058f20f9e8acab403d090_JaffaCakes118.exe