Analysis
-
max time kernel
94s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
17db6b63abdf05059a5da75ad3827a15_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
17db6b63abdf05059a5da75ad3827a15_JaffaCakes118.exe
-
Size
482KB
-
MD5
17db6b63abdf05059a5da75ad3827a15
-
SHA1
3804d4f14faf27a69e0cdc2ff16a9d632d683d6b
-
SHA256
d6c04968ad6d636d10292cee6a79d9cef40249dcf85748540bdbc035e0f7272f
-
SHA512
07130d273579cec897a210e327015871b013b258925dc93e43190f57f61e094aae46859a36b1dca7367833515423c050aa912495fa118708fea286fc904f368d
-
SSDEEP
12288:keulMGw/qn159UyLOBIXDS/zujIKDsiqHHlR8bQOo5hmrbSd:znGwyDKyLPGLpKDs1l6QO4si
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/960-14-0x0000000000400000-0x00000000004BC000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17db6b63abdf05059a5da75ad3827a15_JaffaCakes118.exe