Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
7847951a6353bf798d7820414dfc0155_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7847951a6353bf798d7820414dfc0155_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
7847951a6353bf798d7820414dfc0155_JaffaCakes118.exe
-
Size
648KB
-
MD5
7847951a6353bf798d7820414dfc0155
-
SHA1
f1de1ca13d248692bc962e01cba5f0a765f29be7
-
SHA256
02131be9940300a1f0d7f95b76c16f7ea3dd2e54f854c820079aebd42e293e04
-
SHA512
186051c3fc7d9781f4c5005132807ebd84860644e5c5c31f9a2ddcea7d5749dfa93e4985bf82e5e1432723317e2b906ad0289f50d6459192723ea1eb0e1eafbe
-
SSDEEP
12288:iDwCu4e/aMF0DENQuRkfPp1FmnZ8uDQw:4QrEoau
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7847951a6353bf798d7820414dfc0155_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2180 7847951a6353bf798d7820414dfc0155_JaffaCakes118.exe 2180 7847951a6353bf798d7820414dfc0155_JaffaCakes118.exe 2180 7847951a6353bf798d7820414dfc0155_JaffaCakes118.exe 2180 7847951a6353bf798d7820414dfc0155_JaffaCakes118.exe