Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 23:55
Behavioral task
behavioral1
Sample
10fcb1f04060935f780caa807bc136d7_JaffaCakes118.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
10fcb1f04060935f780caa807bc136d7_JaffaCakes118.exe
-
Size
18KB
-
MD5
10fcb1f04060935f780caa807bc136d7
-
SHA1
b48bb328ea84895ac6a4fd670d2a98b9750ec48d
-
SHA256
81f3c2f831b3865e4a0c94ca8ad6831612d1c32937a08300bdb26cae176fd4c7
-
SHA512
b1961cdd2ad2a18703909c18b21ccb1031bae2c9e9f9cbc7c86d1660c7e6d178786eb49a984ae5c60e3b922beaf7893ce8f80bb4d0f47cac3bde3b2f72f797ea
-
SSDEEP
384:3apMhB626nj6NHAOMPAIQ78l4TuJmM2cW04R4ogEDTy4CiN9MqVjv:+MhBTg3PAIKTJ6CDW7vq
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/752-0-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/752-1-0x0000000000400000-0x0000000000413000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10fcb1f04060935f780caa807bc136d7_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 752 10fcb1f04060935f780caa807bc136d7_JaffaCakes118.exe