Analysis
-
max time kernel
97s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 23:25
Behavioral task
behavioral1
Sample
f0d262888df005553210d4026c577efd_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
f0d262888df005553210d4026c577efd_JaffaCakes118.exe
-
Size
103KB
-
MD5
f0d262888df005553210d4026c577efd
-
SHA1
b30a895deb94f7e598e559048370189988f5aba6
-
SHA256
3c5e9a989a7f65c38c0274b5c0add3e8fd3e38aa60a1448df8d57d4f44eac8e0
-
SHA512
a2106cdcb19613525c1b0e48cfda7853d9788e49e2d5e49593b0825747f9992053a93d4c6ab2268b67088f4ab6815d1cf70141ce943b3c179d8b3012d5c824c8
-
SSDEEP
1536:/6yFAKKzrXZ0zvTO6IYbOfl6h9qCfFADKzrXI0z3Tx:1W7zrXZ0zvTQmOfU9qUWGzrXI0z3Tx
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2916-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/2916-3-0x0000000000400000-0x000000000041B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0d262888df005553210d4026c577efd_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2916 f0d262888df005553210d4026c577efd_JaffaCakes118.exe