Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 11:09
Static task
static1
Behavioral task
behavioral1
Sample
b33bd8504b32e2d44e7850a15dd84413_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b33bd8504b32e2d44e7850a15dd84413_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b33bd8504b32e2d44e7850a15dd84413_JaffaCakes118.exe
-
Size
32KB
-
MD5
b33bd8504b32e2d44e7850a15dd84413
-
SHA1
11ce0c665e68709465316dc5a80bdf0c32e937e8
-
SHA256
e9776e8e391653439bd3919eb4e3a3d25af48d5c346b500a371f3b75ef622ee4
-
SHA512
85a8fa2730c71ebb7b70c050aabae739556976fa215c21cb4c71339c15e1aef6f1c1b39fb77e50cafd265f2d69b908dde940f2baa4bd0601995093e264789558
-
SSDEEP
384:E1WEc3Ps4+YmRXujle1VSXxkH4C+i+TNv+aDA4vp:E1WEAjmReA18hpr57xv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b33bd8504b32e2d44e7850a15dd84413_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 b33bd8504b32e2d44e7850a15dd84413_JaffaCakes118.exe 2728 b33bd8504b32e2d44e7850a15dd84413_JaffaCakes118.exe