Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
741d8b5c22e0984550f37cada7d52cc6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
741d8b5c22e0984550f37cada7d52cc6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
741d8b5c22e0984550f37cada7d52cc6_JaffaCakes118.exe
-
Size
32KB
-
MD5
741d8b5c22e0984550f37cada7d52cc6
-
SHA1
f0ea49ed0da4126a10a85308cb67158a1152ff16
-
SHA256
26b1dda8ad853d95cd37cef4258fb7af4ade88d0479935c0512eab199fd902dc
-
SHA512
23303f40d1e507c3dd5b569f178e04ce6c5328f2eab8d6558ce49ed15184c76ba5481dc474963a6aa36fa472ef4d95756b3fca8dfdc74350bded886dd04c6952
-
SSDEEP
384:EPyQE1MVJnMRNusKBs9F9rcUySJouitCtTQS4Pn9M7E67TLm+DGSEP4ka:E6QxVJINdn9rrckXr4PE/B/k
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 741d8b5c22e0984550f37cada7d52cc6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3020 741d8b5c22e0984550f37cada7d52cc6_JaffaCakes118.exe 3020 741d8b5c22e0984550f37cada7d52cc6_JaffaCakes118.exe