Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
734d1ae64b17fbb847736d7298bcdfa3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
734d1ae64b17fbb847736d7298bcdfa3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
734d1ae64b17fbb847736d7298bcdfa3_JaffaCakes118.exe
-
Size
228KB
-
MD5
734d1ae64b17fbb847736d7298bcdfa3
-
SHA1
9806b7fa4ad18e4c060b09b08d4f3cab9cf28566
-
SHA256
f82cc05d417c0e98662ee45965759be402d56c8f4e968dd93c3b154ef66a2847
-
SHA512
fc69e051ecfdcd48f1bb3803faa932ca53957c79d61460ac71dae702128bc94562265d41735c75636490e045227800bc08afc1212b12107a2b00076c4e6e202a
-
SSDEEP
3072:Up426ViLvzrUcOQuQOu+s6XEYeJXvRKByTgJMW2xT1cHtF:UpiV25ufu+s6XEPJXvYBy0MW2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 734d1ae64b17fbb847736d7298bcdfa3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4360 734d1ae64b17fbb847736d7298bcdfa3_JaffaCakes118.exe