Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:00
Behavioral task
behavioral1
Sample
eaa17616500b022f6af939ae92bf45fb_JaffaCakes118.exe
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
eaa17616500b022f6af939ae92bf45fb_JaffaCakes118.exe
-
Size
5.3MB
-
MD5
eaa17616500b022f6af939ae92bf45fb
-
SHA1
51934eddd2f3f5c9292d2e5adfbae141354ef833
-
SHA256
14b8bc5677aae452fd1e85b94bf1edd1080244b3f10468d2c7ea9376cf72a994
-
SHA512
ba7833dd7b62e8d727a018c30c323bb849a723f893f23bdf09ae549c145e1095382f5ec0066e24ef32242e9373a474f3cc61df0aad993877b4f077a93b90acea
-
SSDEEP
98304:TmoLf274D3j1hrm581Cucwn7Zvr+6cPPWiyw+P1xjyyCyyyBMq:TjS8DT1Bm2YuckfwC1xVMq
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5092-0-0x0000000000400000-0x000000000106D000-memory.dmp upx behavioral2/memory/5092-2-0x0000000000400000-0x000000000106D000-memory.dmp upx behavioral2/memory/5092-4-0x0000000000400000-0x000000000106D000-memory.dmp upx behavioral2/memory/5092-7-0x0000000000400000-0x000000000106D000-memory.dmp upx behavioral2/memory/5092-8-0x0000000000400000-0x000000000106D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa17616500b022f6af939ae92bf45fb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5092 eaa17616500b022f6af939ae92bf45fb_JaffaCakes118.exe