Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 20:52
Behavioral task
behavioral1
Sample
fd1f5d28df236dc5d064e0e28a2b0daf_JaffaCakes118.exe
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
fd1f5d28df236dc5d064e0e28a2b0daf_JaffaCakes118.exe
-
Size
82KB
-
MD5
fd1f5d28df236dc5d064e0e28a2b0daf
-
SHA1
52a77eb0262917a8b9d62b0ec1a9d7b82e375882
-
SHA256
5820741eb4ece380e7b35a64eda0dd25f63998ae7866dc1fb65b05e6437f335d
-
SHA512
d3b381afc639328493e94996bb65eadabcc662a4339ac71b60c24a4bcede7e9236d5c52a0b76dd02eae312bdf64eb8bfa322383278dfdf8edd5dfe8cf53349c3
-
SSDEEP
1536:W+gll7gLkKaEQsphSvxPlgsogqd2bqg3fMqkho7QbmH5MZ5e19R8R:8FEltalIAb53fZkyUbeKoJG
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2848-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2848-2-0x0000000000400000-0x0000000000421000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd1f5d28df236dc5d064e0e28a2b0daf_JaffaCakes118.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node fd1f5d28df236dc5d064e0e28a2b0daf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\nxvyd fd1f5d28df236dc5d064e0e28a2b0daf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\nxvyd fd1f5d28df236dc5d064e0e28a2b0daf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell fd1f5d28df236dc5d064e0e28a2b0daf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID fd1f5d28df236dc5d064e0e28a2b0daf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} fd1f5d28df236dc5d064e0e28a2b0daf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\nxvyd\\command fd1f5d28df236dc5d064e0e28a2b0daf_JaffaCakes118.exe