Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 03:52
Behavioral task
behavioral1
Sample
0dc8d6533daa7f298760c40f5a538d76_JaffaCakes118.exe
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
0dc8d6533daa7f298760c40f5a538d76_JaffaCakes118.exe
-
Size
22KB
-
MD5
0dc8d6533daa7f298760c40f5a538d76
-
SHA1
878bb40e8c366e0dfba49bf7391c6fd14ee017a6
-
SHA256
b93e0d2cbdfd59b9cb675339a21e0a50fb8f9f0a6ecb601558e13fcc721e3496
-
SHA512
fa27c127a2a9a40a9542bcad46a98f8c9155a03895014741ca8815f73f20feca19c4ea79ee6bb5bd43f85e08e6a78335783e00b6b411657af822ae783c7e3fb2
-
SSDEEP
384:aEtOfGiLwIyYBMihAiiP+LJfCP4BK5thTRcs6ioFHCip+:PtOfG6/yYBMihAHPU5CP5jRcMoD
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3040-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/3040-2-0x0000000000400000-0x0000000000411000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0dc8d6533daa7f298760c40f5a538d76_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\PIC 0dc8d6533daa7f298760c40f5a538d76_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\PIC\MID = "a68b570ee00b0000fe0f1069" 0dc8d6533daa7f298760c40f5a538d76_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\PIC\MID2 = "0dc8d6533daa7f298760c40f5a538d76_JaffaCakes118.exe" 0dc8d6533daa7f298760c40f5a538d76_JaffaCakes118.exe