Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
ac39f74d5e8d0a5a256632f92f27ede4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac39f74d5e8d0a5a256632f92f27ede4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac39f74d5e8d0a5a256632f92f27ede4_JaffaCakes118.exe
-
Size
28KB
-
MD5
ac39f74d5e8d0a5a256632f92f27ede4
-
SHA1
bdc5106318844f64674b5029f98d5ec8f54062eb
-
SHA256
f48251a918fc5663a63306efc5e567e96defe649a09270720f61a21d96c3ab0a
-
SHA512
80e7dd9ff70d1df997abb08017abaacc46416e160212504171539bea073d7923a2514b7260fcdf17be81d94cd0bbb7f70091fb8449d5dfaa5062606d2ec73de1
-
SSDEEP
384:7zrSApAO0sMI3d5/V2tLqgOo/MpFYiBbxx:3rxpAOnMid5sqgdMV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac39f74d5e8d0a5a256632f92f27ede4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 ac39f74d5e8d0a5a256632f92f27ede4_JaffaCakes118.exe 2712 ac39f74d5e8d0a5a256632f92f27ede4_JaffaCakes118.exe