Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
b0076d7a664a694f9cdb0d2877ab21cb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0076d7a664a694f9cdb0d2877ab21cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0076d7a664a694f9cdb0d2877ab21cb_JaffaCakes118.exe
-
Size
635KB
-
MD5
b0076d7a664a694f9cdb0d2877ab21cb
-
SHA1
ea2e77bd217f596ad920ae70be1ed7d083ae9414
-
SHA256
7017bb66577295e82449186354f205d7e9256e1c473b0a733a9402ae74189d7a
-
SHA512
9e65f720e8b58cfae86fdb936cea21206e1f99e8b298841a5ae018239f50c41a612a54e9c24b73f9eb728af02ffbde5a20752ad7d8439d8bf1709055a3d4a1d4
-
SSDEEP
12288:xYGONjeuSAnRsICmgr17JY+Djg8ROFnIUvj/X+oVbyWDsK/H9zp8M:+rNjYAnRsICmgrVJY+A8ROFnIUT+oV2Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0076d7a664a694f9cdb0d2877ab21cb_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2372 b0076d7a664a694f9cdb0d2877ab21cb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2372 b0076d7a664a694f9cdb0d2877ab21cb_JaffaCakes118.exe 2372 b0076d7a664a694f9cdb0d2877ab21cb_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0076d7a664a694f9cdb0d2877ab21cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0076d7a664a694f9cdb0d2877ab21cb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2372