Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 13:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_25e48dc5f39b29bbf424aab87b91797c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_25e48dc5f39b29bbf424aab87b91797c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_25e48dc5f39b29bbf424aab87b91797c.exe
-
Size
96KB
-
MD5
25e48dc5f39b29bbf424aab87b91797c
-
SHA1
d936ae9241fa5fd2e7d3d6a9ae69a2be50ca286d
-
SHA256
76105d4f70830d24cfcd94acdf5a505a0095b01409f4aa7ae08c8c84d2eab5b5
-
SHA512
41760a9af913e69d2114f104786982b5b1c01ec37754eecafc22f4e32b2ac38112554233c9e3dafb30b2a29398c1617615372a0f33dd3c67751af39413e9e560
-
SSDEEP
1536:GM2FWnw6Ib2Zc/MNsPLu2gk0J40q3qhSsXJ3dk:5MH6m2WMN2hZ6MsU
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_25e48dc5f39b29bbf424aab87b91797c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1736 JaffaCakes118_25e48dc5f39b29bbf424aab87b91797c.exe