Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 08:50
Behavioral task
behavioral1
Sample
1700bdc7e7db31f664eed5baee5d2513_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
1700bdc7e7db31f664eed5baee5d2513_JaffaCakes118.exe
-
Size
125KB
-
MD5
1700bdc7e7db31f664eed5baee5d2513
-
SHA1
2285e3309c4919da1753ec37ab7d4ffe76123018
-
SHA256
a1303ca4bbadea07fc12777d1922b8be3880a1e6e607727ae9db5c70607ee82e
-
SHA512
cb98c585bd79ae9cde86065a2bc73f698f2a65d9800167caf62d11ab8b9937267866c4eba79f4ecbde986d3a9b4e6fe8754119cf6fcbff31bb3cdd86dce8a1af
-
SSDEEP
3072:hicPKAaeaZ3dCHx8ie9tiiFkfbzMLQIZYJGqzG4:hlPKAVSt029JFkf4QICL
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1624-0-0x0000000000400000-0x0000000000447000-memory.dmp upx behavioral1/memory/1624-3-0x0000000000400000-0x0000000000447000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1700bdc7e7db31f664eed5baee5d2513_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1624 1700bdc7e7db31f664eed5baee5d2513_JaffaCakes118.exe