Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
81d11214d2b793895e4e6cab7434d62d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81d11214d2b793895e4e6cab7434d62d_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81d11214d2b793895e4e6cab7434d62d_JaffaCakes118.exe
-
Size
276KB
-
MD5
81d11214d2b793895e4e6cab7434d62d
-
SHA1
3675aeb0e9c5087eec5474d0a7cd84b31c056b0a
-
SHA256
07f4088d1b587fdbaac73b64f34b4120011cb625e465e7237111d12f2b0a4114
-
SHA512
f442bd75b93c3c90248ae465d77918d3f37838c52d5a509845d02bb38706aea9484dc57af1effa17955a0e7c66105ee2d92bb556b2cd501f62d6b689022ab3af
-
SSDEEP
3072:1NHTrPfgwbYLFurnZYWbM1RRrzcdDyfbBlsc4o8d8I+zOL/6wiD07d:1SwULFAnZ6TlwdDYgddczOL/6q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81d11214d2b793895e4e6cab7434d62d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2188 81d11214d2b793895e4e6cab7434d62d_JaffaCakes118.exe