Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
70f5546ad1652eca2c95df4b303881fa_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
70f5546ad1652eca2c95df4b303881fa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
70f5546ad1652eca2c95df4b303881fa_JaffaCakes118.exe
-
Size
7KB
-
MD5
70f5546ad1652eca2c95df4b303881fa
-
SHA1
851a1459c55a640de38231d868399078cce4975e
-
SHA256
5ea85d0c56024798d4bd97dce8caf8dc27651da3081dd76d99f887af48ead820
-
SHA512
88afa48352d06b580d06ce0f1d63ae9c746b11c013c1a5dfaf85da8ce4ba78198d7bcebba259c0887e266eda99396f662a05c4ae655eca40681c97b26a52a930
-
SSDEEP
192:2WcVQl2rVAP9xl1AHsbxgzwFGjPlmwnQAzX:2WcvYxDAHuRmV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70f5546ad1652eca2c95df4b303881fa_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2916 70f5546ad1652eca2c95df4b303881fa_JaffaCakes118.exe