Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
6f8ff0029b435982ea91461db4b72081_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f8ff0029b435982ea91461db4b72081_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f8ff0029b435982ea91461db4b72081_JaffaCakes118.exe
-
Size
1020KB
-
MD5
6f8ff0029b435982ea91461db4b72081
-
SHA1
e1cd3b1b485d2d4e37528e24091a67621690b90b
-
SHA256
fe5852a0c97c2d5a4ddd761c2dc98fca88ca57ea2d0c639226a90e3c75bdcc1b
-
SHA512
e79309bdbac1b572b6795c5e7a59ca5c88933d9569165f74cdf04bef187c7284dd9c1d738e2284ee29cbf4ce5815298ccae1f1542fb9cc42729dff86c3475b43
-
SSDEEP
24576:3rj5I+YHZ6ElGEBMOzwKY1Qwd0eQb6jZeu56o:3WH8QBM9/WG9tp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f8ff0029b435982ea91461db4b72081_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 6f8ff0029b435982ea91461db4b72081_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5c5ed2b71435e03a110ad5ee0238a536d
SHA18074871ce04df025a24f0c0c07ebd8cec7d0b925
SHA256468a0fc6aec668f7dc1089f7462949da4f8cfeddd8c8f04058d6d16f2036ee79
SHA5123ac775a7ae7ea1fe3ad83bcf5b141f1af290b78c8e5e66ec66c5f8ae6239ad522fb32970b0338d0c849db2f8c11e0061c151c4079de45d373b686f75fe1f535f