Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
acef027642e62ffde8298de8816226a6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
acef027642e62ffde8298de8816226a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
acef027642e62ffde8298de8816226a6_JaffaCakes118.exe
-
Size
632KB
-
MD5
acef027642e62ffde8298de8816226a6
-
SHA1
767a7845e6eac319557dfdbe7e9106fcfff803a4
-
SHA256
cd8331de8f0b4541a8657c859f3764c6101fe20d71846db4cb55fd607bcea247
-
SHA512
7781632226f3bbdc1817a267534e327c48e5349fa31700ac754e6a3f7fa8be6feb8cbb61b5a233835e9048a4e2865db0b5fd071df0f0d462f0042675d0c1f700
-
SSDEEP
12288:slwBb+3fHVxUvaYSDgl7JYXnP3IoYmXaTdYuapUfXC5WL+ZV0pPt:sly+3NxUvaYSDglJYXngoYmXaTdYyfSe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acef027642e62ffde8298de8816226a6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1956 acef027642e62ffde8298de8816226a6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1956 acef027642e62ffde8298de8816226a6_JaffaCakes118.exe 1956 acef027642e62ffde8298de8816226a6_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acef027642e62ffde8298de8816226a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\acef027642e62ffde8298de8816226a6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1956