Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:20
Behavioral task
behavioral1
Sample
083955e0023c4bb486cfd75ff491c8e8_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
083955e0023c4bb486cfd75ff491c8e8_JaffaCakes118.exe
-
Size
125KB
-
MD5
083955e0023c4bb486cfd75ff491c8e8
-
SHA1
7d627df8b5e831746e2d24c69c1cd3235eb4ba0c
-
SHA256
1edf5b4c66768012e99bf8201904aa870ed57290fe7f97dccefbff055c0fb82a
-
SHA512
a0340fe2aba1bfb8b69d97a97eff776c1d7aaa4401c487c2c06da5b8ddbd28ac867a7d039507edf57b2ed8d68575d988b114a938f79b12590923ef7a31b51d9f
-
SSDEEP
1536:3+SOoHFep0bw17pz3suP8dwCupvqL8+TqAOVyvdTmnBzymaDKqag2sUnEwC6VT:3Xlepf7NcuPwSqL8SqRyemuqagKEwCg
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2524-0-0x0000000000400000-0x0000000000448000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 083955e0023c4bb486cfd75ff491c8e8_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2524 083955e0023c4bb486cfd75ff491c8e8_JaffaCakes118.exe