Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:21
Behavioral task
behavioral1
Sample
b4f5b9861b54042883e876679c72f669_JaffaCakes118.exe
Resource
win7-20241023-en
windows7-x64
3 signatures
150 seconds
General
-
Target
b4f5b9861b54042883e876679c72f669_JaffaCakes118.exe
-
Size
16KB
-
MD5
b4f5b9861b54042883e876679c72f669
-
SHA1
66e5d1e45dc81af680188bb58d4948a31a44d125
-
SHA256
1689131124e29c4ee7c24755bf134731292d65c1affc067c688e317cda7d71fb
-
SHA512
37b5cc357f5a776544ae1de40cbe932882a94e33a0aecc401c461d1e4aa0c4450ffcb30f80d9e9bb8e10feec8b1a33bfecdaf52b89e839e043ed55308d5a2525
-
SSDEEP
384:fo9q5pG7Vbjz0QhuvmtSh/6kTMklKBcdDtI7JliSwlmerfVjuujQA+CJw5:GqDSbP0w+mFko/B8I7JUSiVfVyLA+K4
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2340-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2340-2-0x0000000000400000-0x000000000041A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4f5b9861b54042883e876679c72f669_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2340 b4f5b9861b54042883e876679c72f669_JaffaCakes118.exe