Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 06:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_90b56bc7956979b985444d968c07d74a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_90b56bc7956979b985444d968c07d74a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_90b56bc7956979b985444d968c07d74a.exe
-
Size
136KB
-
MD5
90b56bc7956979b985444d968c07d74a
-
SHA1
b9436c20997bb78217ff139e559d2cc8cce3e2c8
-
SHA256
22230d3a7bd7695cb04746de029fb5dd1827a5258c3cf5d45843428a92bf03b2
-
SHA512
8385b9894f67c1d2d452fb41aa4e8bdf7e0535533e254aca71a38c2c482ef5c87613eb5739de4a1b459101b3a5e944897296752c6949153bd5283b1fc1a71f34
-
SSDEEP
1536:m41u3raOE3N7cuwoYIMFo0aQp2ZUSby46FB8kPD:vu7edao0aQpaUmy46FqkP
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_90b56bc7956979b985444d968c07d74a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1456 JaffaCakes118_90b56bc7956979b985444d968c07d74a.exe