Analysis
-
max time kernel
140s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
b13c5854ff67d5ac5975ce1796440a4f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b13c5854ff67d5ac5975ce1796440a4f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b13c5854ff67d5ac5975ce1796440a4f_JaffaCakes118.exe
-
Size
87KB
-
MD5
b13c5854ff67d5ac5975ce1796440a4f
-
SHA1
396d4a0ddc6f7b48c627c01136f1b39eb7c5d675
-
SHA256
4fa2ffbd22d30534dacce4b40494d40e92945ed7c3358cdd0b5d4ef38f58c2b6
-
SHA512
6ce8cd339121b0885b96c969fd0cb3b8d6e35700bee7e356330649a498140ac2ae0d45b949aa06f581483c771e88f7df4946f04ab0e7c88ba345a044910f5b54
-
SSDEEP
1536:4mkYNM68jAh932mg8a52ZgEhVQMHM83hKDzZBTISnb7CASD0OH8Z/S:b5NM7AhR2cPM2Y/z7CAN2mS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b13c5854ff67d5ac5975ce1796440a4f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4020 b13c5854ff67d5ac5975ce1796440a4f_JaffaCakes118.exe