Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
adbaebe78281b63b168b6de9164252c8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
adbaebe78281b63b168b6de9164252c8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
adbaebe78281b63b168b6de9164252c8_JaffaCakes118.exe
-
Size
364KB
-
MD5
adbaebe78281b63b168b6de9164252c8
-
SHA1
b74035b49476ef25c5ca4f1fed99039ac5b308c3
-
SHA256
aa7511c1a75772a268d527c6c1e11dcb5abdcfcaee93f1cc92821cc3332fd7cf
-
SHA512
619bf81d35ca53dbbdce9621d01de6a62851ccdf5cabf2c6d725d07bde8f1f303c0b96d2fc2cd2334a25e542376436bc13b46ad8e4adef6052306d3cb5353431
-
SSDEEP
3072:K7xsFzLPyVX+Gnog6VVNW2kHaZua626t90KDMq/I+GF65ez/2mracRKvhJz/RkkG:ex3Z6Vl2aZH8VDhA+GFpzPraUKvhJA
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adbaebe78281b63b168b6de9164252c8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1924 adbaebe78281b63b168b6de9164252c8_JaffaCakes118.exe