Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 02:51
Behavioral task
behavioral1
Sample
ea73e0fd6281965f61ad58caa3325a2b_JaffaCakes118.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
ea73e0fd6281965f61ad58caa3325a2b_JaffaCakes118.exe
-
Size
246KB
-
MD5
ea73e0fd6281965f61ad58caa3325a2b
-
SHA1
f6328bb750a604ae1921353ec8bbd108fcfabb55
-
SHA256
f1abde176e3567f08393cf799556c35327fd37cd74e459f66a7f47d489282e5d
-
SHA512
7825aeb2b3870d67250b2c076c8c877d21bb11c6efbdfd2c21e883e889bec4f8ba62c1584f81ab5343057a24b89010223e381e51c4f37a3eaeb91b90408a35f4
-
SSDEEP
6144:4tlnL+/edZdTFCiYgNXtnB063a+rr/9RYo0rRRPM:4H6G2wx/v3
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5060-0-0x0000000000400000-0x00000000004A6000-memory.dmp upx behavioral2/memory/5060-2-0x0000000000400000-0x00000000004A6000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea73e0fd6281965f61ad58caa3325a2b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea73e0fd6281965f61ad58caa3325a2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea73e0fd6281965f61ad58caa3325a2b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:4400