Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
699c73e3887563490e1e6ce7298ed3c6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
699c73e3887563490e1e6ce7298ed3c6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
699c73e3887563490e1e6ce7298ed3c6_JaffaCakes118.exe
-
Size
155KB
-
MD5
699c73e3887563490e1e6ce7298ed3c6
-
SHA1
345e828642b16f4eed7167ffcc8ea1fbf58ef21f
-
SHA256
29d81afe7396a35a3d02a28eb8cc3083f723c812cd1b2d4a235361c014d0bf36
-
SHA512
7ae3950e065136ddf300d0491da2feab04831e70e3af24f27f4b42b4930fd2c30358d51af323e8c5f9087b8338534f9cfd07df324d2cff949cc00dfaad5c1683
-
SSDEEP
1536:tIzKUJIs6wEizE7xGHQy9I9MkOzqlYw2AvN6Rp/LlYw2AvN6azZkC9:tIGOjEDyqicEp/Licdz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 699c73e3887563490e1e6ce7298ed3c6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2556 699c73e3887563490e1e6ce7298ed3c6_JaffaCakes118.exe