Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
a3e65f7bf48ec3a87d40d9fdacbbd175_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a3e65f7bf48ec3a87d40d9fdacbbd175_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3e65f7bf48ec3a87d40d9fdacbbd175_JaffaCakes118.exe
-
Size
626KB
-
MD5
a3e65f7bf48ec3a87d40d9fdacbbd175
-
SHA1
332a360b43e4ec2b3ed834f77f09bfad0589342e
-
SHA256
70fc6f901524a2390a9c2875b26359005f4d2adafa6f8988d3c402db7a9ae6a4
-
SHA512
56205c3ad8b9a2359c5c795908b477d61648cd1df14ac7d4954d91cd349b6973ea32ee4a1b74f94c458e7d0a678f823a3855fd4f0a7d6a32645324e1fbd7632c
-
SSDEEP
12288:2dp7+V+Q7A6fmiNq7JYiG8nCKco+CBkpB1ue3y3yJHVNBjpTW:2dp70+Q7A6fmiN0JYiBCKcHCBkoe3y3X
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3e65f7bf48ec3a87d40d9fdacbbd175_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3348 a3e65f7bf48ec3a87d40d9fdacbbd175_JaffaCakes118.exe 3348 a3e65f7bf48ec3a87d40d9fdacbbd175_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3348 a3e65f7bf48ec3a87d40d9fdacbbd175_JaffaCakes118.exe 3348 a3e65f7bf48ec3a87d40d9fdacbbd175_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3e65f7bf48ec3a87d40d9fdacbbd175_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3e65f7bf48ec3a87d40d9fdacbbd175_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3348