Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 18:01
Static task
static1
Behavioral task
behavioral1
Sample
a38fb8765e5d935695f361481d4c9e13_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a38fb8765e5d935695f361481d4c9e13_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a38fb8765e5d935695f361481d4c9e13_JaffaCakes118.exe
-
Size
3.2MB
-
MD5
a38fb8765e5d935695f361481d4c9e13
-
SHA1
c02371cd829fdd2314ae8f61e2b1c60be9e3fe46
-
SHA256
a1d182bb075b5a115a3d469aba17ae7c7df7c3273e5953126bfe0b50bd5719ed
-
SHA512
e65234bc5239ed8d06e4d6e2502c638f942a19daa5ac65f21506fd193c961a7ba4c2eb0693f3d5ce8c4fb03336a22a4de0330695bba4abb2d5ccfd5a08f16032
-
SSDEEP
49152:xrWnwZEBEUn1SDupc4RXYTaLksU6i5PZz:xDEfYDgc4RXLksU6i5N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a38fb8765e5d935695f361481d4c9e13_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1916 a38fb8765e5d935695f361481d4c9e13_JaffaCakes118.exe 1916 a38fb8765e5d935695f361481d4c9e13_JaffaCakes118.exe