Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
7432e927efcdcf2265726983c3d3d863_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7432e927efcdcf2265726983c3d3d863_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7432e927efcdcf2265726983c3d3d863_JaffaCakes118.exe
-
Size
344KB
-
MD5
7432e927efcdcf2265726983c3d3d863
-
SHA1
c0a24f2eebdeef5820672bd2f3e868f66f1f5ba8
-
SHA256
c3afa85bdff76d24353bb64e63839e4718874ef75a52cb58f055a73581791c9f
-
SHA512
f3ba99cf4aa91202a0bfaaba586a85a6d4f84fb041cbba8d0361887f82243146bad110342d94c816e80ec75e56894a16b74a3bbbccd61384f172195fbf1c19a5
-
SSDEEP
6144:YVNgyBaZlSWTVIfBl2eK9Fk0yTgyBaZlSWTVIf:XyBaPpTVIr200ryBaPpTVI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7432e927efcdcf2265726983c3d3d863_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2428 7432e927efcdcf2265726983c3d3d863_JaffaCakes118.exe