Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
ad6b8541d5ca9e2f0845585173abba5f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad6b8541d5ca9e2f0845585173abba5f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad6b8541d5ca9e2f0845585173abba5f_JaffaCakes118.exe
-
Size
52KB
-
MD5
ad6b8541d5ca9e2f0845585173abba5f
-
SHA1
e6b6ab2a75828a3ffd57de1388a07b872e12d27b
-
SHA256
543b467c0b23d733bdf8cf70bb83bbc2414f051c388a09b0c2cbe1cb3fd28323
-
SHA512
cecd47dacbbee19474df4efc8a55eb5a471e504042d0ada3e3c0bab7d9e1e34b767c211e493697d99ee7ba0ec57dc9a46d28ab836f35d54a07d459a366130c5e
-
SSDEEP
1536:KYldlc82OnFyF1NiGnGjvh9cNRslU0sgETl:K1NOnFyFRnswRsmJg+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad6b8541d5ca9e2f0845585173abba5f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1976 ad6b8541d5ca9e2f0845585173abba5f_JaffaCakes118.exe 1976 ad6b8541d5ca9e2f0845585173abba5f_JaffaCakes118.exe