Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
685ac3315ede025b5ce3e67432bec567_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
685ac3315ede025b5ce3e67432bec567_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
685ac3315ede025b5ce3e67432bec567_JaffaCakes118.exe
-
Size
120KB
-
MD5
685ac3315ede025b5ce3e67432bec567
-
SHA1
8858ac9322b46403cee39d8b48aacfb16926bbec
-
SHA256
4a8f8035904d56aa9ada10a3b900753216ccf3b3e1af524a9c69e1822a97aa00
-
SHA512
b388677a3b9039a6d1256dd2b69d9689c3dfe7d8894bd46992555543288760e5aa7b6442d84beb3da065c3afbb6d68bbb1b648fca6e13099ad0dcee3a825d255
-
SSDEEP
1536:ndO/ZgbeOewwoE/IRuz2x/xn7En0qlqIhnV4Se4gJz46B3grsVhEhF5vjoU9O3/b:KqjLwoEQR7x/87MJ5ezvj+v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 685ac3315ede025b5ce3e67432bec567_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2056 685ac3315ede025b5ce3e67432bec567_JaffaCakes118.exe