Analysis
-
max time kernel
132s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
b106d4d472f553df1b4edc6099c11ba0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b106d4d472f553df1b4edc6099c11ba0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b106d4d472f553df1b4edc6099c11ba0_JaffaCakes118.exe
-
Size
48KB
-
MD5
b106d4d472f553df1b4edc6099c11ba0
-
SHA1
6827417058ab719146e110c947e4a2dd46d2bb8d
-
SHA256
d4eae3dbf451762e06a6c86f04df0e96bceb058ceaf4512037f5364035e29e3d
-
SHA512
65d00e6abe73441dccb5331fa2e5dbfc8b8f7af662ec18867fdcbf797e363a94d9b9b163fcca8e574dd74acd732151bff1a54cb3e2815a892d1cf43bc86bd498
-
SSDEEP
768:Y0rHD+Dfm4saLj1t2VCNC86GmJYhRm9xszJEeAkaEpt7MIJ:HaNsau0NC86GmZw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b106d4d472f553df1b4edc6099c11ba0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2736 b106d4d472f553df1b4edc6099c11ba0_JaffaCakes118.exe