Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
a5435d0cb21fdb2ad2458abed73dcf90_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a5435d0cb21fdb2ad2458abed73dcf90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a5435d0cb21fdb2ad2458abed73dcf90_JaffaCakes118.exe
-
Size
635KB
-
MD5
a5435d0cb21fdb2ad2458abed73dcf90
-
SHA1
62c3986b503bc8546d16bb76797e10618235593e
-
SHA256
617371deca9c6e2c7168dbb2eb2495772fa2baa6dbe10d83ba698d0ffa71fb08
-
SHA512
51765184e7a6b8ff9f4fa036832327c8c49d07e9f90f8e27901ca46eaa4247150c3ca573bbe420f5069bc269a3946c6d1c0f76b0b28ce6aa0cbce931bd4a380a
-
SSDEEP
12288:FIbPsXD/YIYkaJou7JYOoujbeWADdAq08rWrDUj8pRk:FesXD/YIYkaJogJYOBbeWADdAqfWrDUd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5435d0cb21fdb2ad2458abed73dcf90_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 804 a5435d0cb21fdb2ad2458abed73dcf90_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 804 a5435d0cb21fdb2ad2458abed73dcf90_JaffaCakes118.exe 804 a5435d0cb21fdb2ad2458abed73dcf90_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5435d0cb21fdb2ad2458abed73dcf90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5435d0cb21fdb2ad2458abed73dcf90_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:804