Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
9fc5384476ea741f01e714b63cf0fc13_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9fc5384476ea741f01e714b63cf0fc13_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9fc5384476ea741f01e714b63cf0fc13_JaffaCakes118.exe
-
Size
24KB
-
MD5
9fc5384476ea741f01e714b63cf0fc13
-
SHA1
4608444ed4c9bf862d91d2876e877e5ba89d5393
-
SHA256
86f08a1ecee59dd9d7ef6a95f3993522abcdfc163b107a89d18e3cf3b538724f
-
SHA512
36067b0af3fff98180328827d86e321a6a4d0f01fef6a2b629f2f232da1e38248402f5105ac0dd6274268c114114f3bfdaa69354f87c32e13a88890cdc1463ee
-
SSDEEP
384:UTttDD74mVaNjdqHH2hS4wkkWHH2hS4wkkQo:UTrDD7JVWcbkPWcbko
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fc5384476ea741f01e714b63cf0fc13_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2280 9fc5384476ea741f01e714b63cf0fc13_JaffaCakes118.exe 2280 9fc5384476ea741f01e714b63cf0fc13_JaffaCakes118.exe