Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
70ae18f79ef063551d48e04e5c8f69ea_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
70ae18f79ef063551d48e04e5c8f69ea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
70ae18f79ef063551d48e04e5c8f69ea_JaffaCakes118.exe
-
Size
240KB
-
MD5
70ae18f79ef063551d48e04e5c8f69ea
-
SHA1
0e1fc1109da12255979c75ca160642fc1ae9c3b9
-
SHA256
d7db77286ea7f34403224f917f2a3038bf4693bdc29092ab1176d97acd3768bc
-
SHA512
69146790befc7e36c4b3d9638c4d983f03640bd3626f9d52ca2b7d38b863f690adc1e36ea4892ea382efecb3e5d1a5d86cbaebec9b6a5f934cc74072fb540543
-
SSDEEP
6144:wiGCelN+UTHkLABW2Wi+aO/F8cbxiDKyIZEP:w9Cel0rLAIRP9/DxiDUZEP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70ae18f79ef063551d48e04e5c8f69ea_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1916 70ae18f79ef063551d48e04e5c8f69ea_JaffaCakes118.exe 1916 70ae18f79ef063551d48e04e5c8f69ea_JaffaCakes118.exe