Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:09
Behavioral task
behavioral1
Sample
b4ec68cbc4e81a4e6d49e06cb704cefb_JaffaCakes118.exe
Resource
win7-20241010-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b4ec68cbc4e81a4e6d49e06cb704cefb_JaffaCakes118.exe
-
Size
99KB
-
MD5
b4ec68cbc4e81a4e6d49e06cb704cefb
-
SHA1
f48447e46c9c7f1329e3c5cdb1dc238f149f3bd9
-
SHA256
b5ae1404e68d40184735450b8168aebaee558b76b3830bfbb7d59e3549341954
-
SHA512
21b5b40f938f4076d77d0af7ca832f41aa0ae4dbcb45c7c8bd3c37726f7c49c00093b869101c140c1499849b1010a1e764978b26afc6ff39535535b26027505c
-
SSDEEP
3072:Mwi089AvUB1LZPE1AAQvCTjE/j15AY41C:g0wB1LlyVb+15AYF
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1504-0-0x0000000000400000-0x0000000000440000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4ec68cbc4e81a4e6d49e06cb704cefb_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1504 b4ec68cbc4e81a4e6d49e06cb704cefb_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1504 b4ec68cbc4e81a4e6d49e06cb704cefb_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4ec68cbc4e81a4e6d49e06cb704cefb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4ec68cbc4e81a4e6d49e06cb704cefb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1504