Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
81c9d34f4e223875da7ddc5ee65c37f3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81c9d34f4e223875da7ddc5ee65c37f3_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81c9d34f4e223875da7ddc5ee65c37f3_JaffaCakes118.exe
-
Size
48KB
-
MD5
81c9d34f4e223875da7ddc5ee65c37f3
-
SHA1
b3a5c432ed5e401a66061672aaa4a61107c484ef
-
SHA256
0e02e93a70b33321ec5fa676a5211d6243c6d6c902fd7ccdd15755c30a4023e9
-
SHA512
f38d219a01608d60214c374568bdc0a11f9c0bd28069c3ea84fedead245c4c549f35454ce6fbfeac11ce464bcca481f366de65e201514e54cf10cb7cea0344ef
-
SSDEEP
768:J1DRZDRtdxodadwdSXdx482aTUjbQVnSKXFEyGFIsbk/TYojrkGaZeuDR:zDzDDrdDr4OYjbQxAkT9OeuD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81c9d34f4e223875da7ddc5ee65c37f3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 81c9d34f4e223875da7ddc5ee65c37f3_JaffaCakes118.exe