Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 04:45
Behavioral task
behavioral1
Sample
f9bba63a84374ed389943072338cb5ba_JaffaCakes118.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
f9bba63a84374ed389943072338cb5ba_JaffaCakes118.exe
-
Size
188KB
-
MD5
f9bba63a84374ed389943072338cb5ba
-
SHA1
e2400574b645ae633369ef603353414ba395bc82
-
SHA256
40e4623e379d1c3fff20c74f8cda57bd4d48a20d3c86c634e42f1840f53b871f
-
SHA512
3a333930ae54d8649199715c4989e88475989160944f6897fcad672ce8332766a45cf29b4cc74d42aa5bb6db3f7362538576332db48900843412e08c1c986f10
-
SSDEEP
3072:AELkjZ42cEiWAYQDVnCb5lhxoTCBYUSJcsPngHih0BVHigQvLYg:A0kl42cE/LQIrXkCBtS2kngHzCgJ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1800-0-0x0000000000400000-0x0000000000449000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9bba63a84374ed389943072338cb5ba_JaffaCakes118.exe