Analysis
-
max time kernel
134s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
a519dd176918c2211031f512bd6150b7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a519dd176918c2211031f512bd6150b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a519dd176918c2211031f512bd6150b7_JaffaCakes118.exe
-
Size
76KB
-
MD5
a519dd176918c2211031f512bd6150b7
-
SHA1
eaeb49ad78de2851bc4bcc2e4cf61f53eb25a0f0
-
SHA256
17166f3d68f9ed3e29468d98c9ba68fede351004667316942c7dd54927e21770
-
SHA512
844475ebd6df760c1752e0df7816da35badfc5fe971039ecd55b2dc72635942452657ccc91db95d16aaa4f114ce7da626ca6dc50b46d9e3b52b27c94abf046a6
-
SSDEEP
1536:2V0QhAGfpfZgCIwKJG1gFXOsA2Z4qGsj1kL/NHvbup5JMg:e0MpfZgCIw2Omesbosj2g
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a519dd176918c2211031f512bd6150b7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2424 a519dd176918c2211031f512bd6150b7_JaffaCakes118.exe