Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 09:58
Static task
static1
Behavioral task
behavioral1
Sample
959d5c8939cba4d17dbfdee7e080183a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
959d5c8939cba4d17dbfdee7e080183a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
959d5c8939cba4d17dbfdee7e080183a_JaffaCakes118.exe
-
Size
52KB
-
MD5
959d5c8939cba4d17dbfdee7e080183a
-
SHA1
7d39e35ab8dfc62d5d6e7f54a49b882622b6de7e
-
SHA256
ae342b4ab4dae9ad0f53df7dee700bf61c5996a53442856ba4feb6a6115f418b
-
SHA512
5f46830c13adabeb746d023ea5dd9f55c3898a3dda9a108aa113d71e3bf4bbdb57c7c827c2aa513b23516107b9f4d7d754a00c5ba615a9e409251877ac0e1ac9
-
SSDEEP
768:uoOgdsBo5hNZ1tYF3UCJGrXg16DHAw/j3:rb5jZ1tYCC0rXXDgw/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 959d5c8939cba4d17dbfdee7e080183a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2432 959d5c8939cba4d17dbfdee7e080183a_JaffaCakes118.exe