Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
ab29cf36fc318d55e679debc407d98a8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab29cf36fc318d55e679debc407d98a8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab29cf36fc318d55e679debc407d98a8_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
ab29cf36fc318d55e679debc407d98a8
-
SHA1
4b147e788f2cc23dfc8faac74dfba3a2080b8831
-
SHA256
01bb12605bb273eeaceb99f260c40ff646c4c67f3f87c7d5cfa4bb6572b0a829
-
SHA512
9f87472bea41365fa55ed2518a89830f43a7d0ec37847048d257f34bb04ee41d62be5aef7cd80ccc28649185b660d8834294306ac7e2f2f5db1cc4ba41a3ee30
-
SSDEEP
3072:Szpdjx3+LB8V0hBFBM4YHrvTpqhnLsq62qiJiYaGDSTzasyP/27KeTUs+QXo0mzS:WuDlZwhI4ZwrZwtSM6NhyAHU62Zw0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab29cf36fc318d55e679debc407d98a8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2116 ab29cf36fc318d55e679debc407d98a8_JaffaCakes118.exe