Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
8cbd41c7f81f77d86ffec7c2ab8e7403_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8cbd41c7f81f77d86ffec7c2ab8e7403_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8cbd41c7f81f77d86ffec7c2ab8e7403_JaffaCakes118.exe
-
Size
12KB
-
MD5
8cbd41c7f81f77d86ffec7c2ab8e7403
-
SHA1
ec8681b4e96074ea833bda12871713f904820307
-
SHA256
21e3baa9a17aa2c93835fda218834943aac85d646f48bafcaf2674a54d2c4712
-
SHA512
abf47bf4a10887ba6ef64f2c0bfd85d1314c6d3852bccb4927295856f0fea3489ede2bb5d70c84a725bc00d5c68267b5b5df728e07f190b5073743c077b91bbe
-
SSDEEP
48:ygoXX+HTj8WU0l5uCM8LCmrxbaaaJf5IlqM1wEYMsF0wlEqK2B:IHGTj86ux4v4aDkM1R3YEZ2B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cbd41c7f81f77d86ffec7c2ab8e7403_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 588 8cbd41c7f81f77d86ffec7c2ab8e7403_JaffaCakes118.exe