Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 13:18
Static task
static1
Behavioral task
behavioral1
Sample
a2ada8eab4dccba9e385c163899f85dc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a2ada8eab4dccba9e385c163899f85dc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2ada8eab4dccba9e385c163899f85dc_JaffaCakes118.exe
-
Size
16KB
-
MD5
a2ada8eab4dccba9e385c163899f85dc
-
SHA1
1059667b60406e4c7f16faf143ca5e264395816f
-
SHA256
0a2af965b224ed782e53b5bc9e9c31479940a8cc444010a24adc78532aca855e
-
SHA512
7e28524bdd822dbeb8466181bdcb387c368d24ee99b8500e90d925def6db2272930959991ec2f0a798848d57e4efafae2681ffaee5f298835eab922fdf9c65a2
-
SSDEEP
96:cvhuouwupVapbAGXGjf+Czt53/Qv3iknQJFFMi+wU8uWUI2:1zwF2L+Ib3/s3eJFFMpfWUI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2ada8eab4dccba9e385c163899f85dc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2360 a2ada8eab4dccba9e385c163899f85dc_JaffaCakes118.exe