Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
a28073b02ce25b6bdc9760be79522a11_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a28073b02ce25b6bdc9760be79522a11_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a28073b02ce25b6bdc9760be79522a11_JaffaCakes118.exe
-
Size
348KB
-
MD5
a28073b02ce25b6bdc9760be79522a11
-
SHA1
28b16d07375f34f536954927642cac1673586e99
-
SHA256
969b01bc24d150812557568a6dda5b19600c773644430b7da2f64fe3ebc82331
-
SHA512
418a95c2e86873bf8204ed7f7466574f89529ca859a8616593ff71dbe52e285cc5de7232e090b6d6cfc269e2bc06b49dba0e05c11df7926b568e2681847a7711
-
SSDEEP
6144:GgImphd9OzD0BqWwYoXkU71FV5A9UL1rjDI3LQi557E:GgImphdIzDqvJoXkUplA9UL1U3l
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a28073b02ce25b6bdc9760be79522a11_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1668 a28073b02ce25b6bdc9760be79522a11_JaffaCakes118.exe 1668 a28073b02ce25b6bdc9760be79522a11_JaffaCakes118.exe 1668 a28073b02ce25b6bdc9760be79522a11_JaffaCakes118.exe 1668 a28073b02ce25b6bdc9760be79522a11_JaffaCakes118.exe