Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
93d1fca34931ff998852680e2a004e9c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
93d1fca34931ff998852680e2a004e9c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
93d1fca34931ff998852680e2a004e9c_JaffaCakes118.exe
-
Size
24KB
-
MD5
93d1fca34931ff998852680e2a004e9c
-
SHA1
9df14bf1d4f74ea8776c72c49718b35b09ce3c2f
-
SHA256
e65726e133363bb9048dbc40697e5b50b8065adaa7ee45e5bc6be38fb1790e38
-
SHA512
110cf67cb73389ab25ef08f7fd5cf0dd1cd556869b82305564668ac9528c281f7c41041a2bd1da16bcbbf1eb97164247f26eac92bc920b4aa106860afa0cc291
-
SSDEEP
384:6BgDcGm8B9ZCV66VnSr3iV1550+3jkQLNVxJXH3yU:hDGI4Vv8Yv2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93d1fca34931ff998852680e2a004e9c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 93d1fca34931ff998852680e2a004e9c_JaffaCakes118.exe 2168 93d1fca34931ff998852680e2a004e9c_JaffaCakes118.exe