Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 22:27
Behavioral task
behavioral1
Sample
acd488f2983792a3e73c9567ffc5ca45_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
acd488f2983792a3e73c9567ffc5ca45_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
acd488f2983792a3e73c9567ffc5ca45_JaffaCakes118.exe
-
Size
1005KB
-
MD5
acd488f2983792a3e73c9567ffc5ca45
-
SHA1
a2aae449cd3b20eb5106240460626e3a3b01bc8c
-
SHA256
5a1d5122cfd1dd4aa5b93a484a9107cec402e6d2fb3a676c972a1f02aaca37cd
-
SHA512
82d8c1925a34607b8fd173ac241a49ffb634e45cc22232134427e62077d7752e8afec0b437e75dcb6c6eb9f54be08fa9a954562a0d73b5454f75be623851aa5d
-
SSDEEP
24576:sq9uAyO0P7lAKTdnc6iflf9va8LQA7wrGLVgeY9L6dfIn+P2e8:T9uAdIeUc68lflagQA7wuVge+CfIn++/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acd488f2983792a3e73c9567ffc5ca45_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4964 acd488f2983792a3e73c9567ffc5ca45_JaffaCakes118.exe