Analysis
-
max time kernel
82s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
6f235d4384f9f330511c5183409d1a61_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f235d4384f9f330511c5183409d1a61_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f235d4384f9f330511c5183409d1a61_JaffaCakes118.exe
-
Size
20KB
-
MD5
6f235d4384f9f330511c5183409d1a61
-
SHA1
51b7000aa8b163583a4460d87ffeaa142e36305b
-
SHA256
87870c4795bbfce49ac8837526672867324ecd2a93119194c8ab5c7162b21629
-
SHA512
f7cf7aba2fcb5ae681d7d020d0774cc7a6cf933d3dcd95145378c3755b2eaada34aa49496be889b3833ccf1d79b553ddc2dff2079a6d949ab1fe7b9f23e6b9d1
-
SSDEEP
192:I8FofUPS8B5btbuf5q45rQnD/LvwxPOqpZHRJZsFUV5/VLD5Q6+VsCEH:I4o2HFStQDTwxPOqpZHRJWFUtD5QVeH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f235d4384f9f330511c5183409d1a61_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1292 6f235d4384f9f330511c5183409d1a61_JaffaCakes118.exe