Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 06:56
Static task
static1
Behavioral task
behavioral1
Sample
aa064f0f5a9bd288bc22eca19212735f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa064f0f5a9bd288bc22eca19212735f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa064f0f5a9bd288bc22eca19212735f_JaffaCakes118.exe
-
Size
84KB
-
MD5
aa064f0f5a9bd288bc22eca19212735f
-
SHA1
b40e3a8d2a6e55bcac854ad65b86237c1e6f1197
-
SHA256
796aad99218693bdc098fd869a71e10cb6ebf64c63e82d98f6bfb02cddf47a5c
-
SHA512
9443cb70f7b68560c8c6b11e54ae423439ce6eb4f27765ca0b0794c3cf2d172c3906f354cf5662fdb92a9a1a0dec319927ebce8cf6955f4290d05a6bfdf12dbf
-
SSDEEP
1536:+M+v1al3b9yO67XV3Tn14jaLnoGOHvMq:3+K9yOUjLnvq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa064f0f5a9bd288bc22eca19212735f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4284 aa064f0f5a9bd288bc22eca19212735f_JaffaCakes118.exe