Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 17:38
Behavioral task
behavioral1
Sample
f685ac7a90ca597a57fa30ad2ba0f44e_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
General
-
Target
f685ac7a90ca597a57fa30ad2ba0f44e_JaffaCakes118.exe
-
Size
322KB
-
MD5
f685ac7a90ca597a57fa30ad2ba0f44e
-
SHA1
4d7e4ec15c4147a5f093fc47a61aed10b24530a1
-
SHA256
9089833d7493d71ba248850d01cb3266e64da236d0098a35c0a5da191abf34ac
-
SHA512
d5480fdb632fb9ada58f50dfaf0edc3373ca16aaa530751b65a9fde56e295ca12140036c7c757ec48fb9955817010c0f9410cf22e7aeea584ccf948c1d3aeb5d
-
SSDEEP
6144:vC6pu8zIKBm/RDliCa/RIyVBz46/8nVjRr9tqUxYWUvIPolt2VphN:vLu8zNBm/RtMhl46kVjZqUxYl2r
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1120-0-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/1120-2-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/1120-6-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/1120-7-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/1120-9-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/1120-12-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral2/memory/1120-16-0x0000000000400000-0x00000000004DE000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f685ac7a90ca597a57fa30ad2ba0f44e_JaffaCakes118.exe