Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
a082d91b354a49c4d5b46832cc2a5be5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a082d91b354a49c4d5b46832cc2a5be5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a082d91b354a49c4d5b46832cc2a5be5_JaffaCakes118.exe
-
Size
40KB
-
MD5
a082d91b354a49c4d5b46832cc2a5be5
-
SHA1
a7e3facc31811b9fb3c56d8701d7558484bb418a
-
SHA256
55a253e0d6259eda930617168db3417da67a11e4ead3cd62d70298b0c63da0b2
-
SHA512
a9f6eb999a190da782b8ab01b88e6caffeb5cada5685fea4d6a2552d56744dda6e2b9e72adfc2d55d65b370d89069b2fb658f01f084a3846857268d45d1ff728
-
SSDEEP
384:1m/ryOn/J15xVihvx5ZMaQah298aooX15Gs1m8eRWh5kNGXDEWynlM:1m/1n/J15xYhv7Z5FSduseWh5RzMlM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a082d91b354a49c4d5b46832cc2a5be5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1736 a082d91b354a49c4d5b46832cc2a5be5_JaffaCakes118.exe 1736 a082d91b354a49c4d5b46832cc2a5be5_JaffaCakes118.exe