Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
b021892772f5dd3a38d96663a8c119d6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b021892772f5dd3a38d96663a8c119d6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b021892772f5dd3a38d96663a8c119d6_JaffaCakes118.exe
-
Size
100KB
-
MD5
b021892772f5dd3a38d96663a8c119d6
-
SHA1
062eda4fb282a08dcb3eb7b747ba513841b9fc7f
-
SHA256
db4e4e193323e012d36485ab0259a5a17b540f1f813502c4605c3b6119ba8f3f
-
SHA512
b6f91a9861367decfbea3a8d63bf5a25167fd2309d2576762f464e52f1be9e91becbe6281f0a6d9f9f51c45ce36774a3d6d5d52345e64c314a061b4b9447a726
-
SSDEEP
1536:4qyeYzw2HkISX2ynnIPL4Kd2K7GW5ypekx3OWaN64:4qyeYzw2HRSXNIPkq2K7j5lWk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b021892772f5dd3a38d96663a8c119d6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1544 b021892772f5dd3a38d96663a8c119d6_JaffaCakes118.exe