Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 15:05
Static task
static1
Behavioral task
behavioral1
Sample
b3f204746cf22c8dd6fe4d81da67c935_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b3f204746cf22c8dd6fe4d81da67c935_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b3f204746cf22c8dd6fe4d81da67c935_JaffaCakes118.exe
-
Size
116KB
-
MD5
b3f204746cf22c8dd6fe4d81da67c935
-
SHA1
a2a381245dcbea99f27abf6b379c0007c8d6a455
-
SHA256
cb42208d3ee34b6c0164faa1ed3b6c4d49901ec49cdd24da93cd40b480db1656
-
SHA512
dd95a13b7bf7ade5274bf03bc7add20f4c1bbca93d124da11aab8e7e0ed9352970dc49f559095935e106c5ff12fe2dd1d379db75997fe1d880ed61e02afc1e2a
-
SSDEEP
1536:GyC9PfL9NQaKpHrM5KIpF4RMsNEk8rkwOr1bDZQUi+UBu5M9y9tB2:VEPfhNTK1sb4+ri5i8i
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3f204746cf22c8dd6fe4d81da67c935_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2280 b3f204746cf22c8dd6fe4d81da67c935_JaffaCakes118.exe