Analysis
-
max time kernel
21s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
b5a4f8dab06176f15c10fb4ec13eebaa_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b5a4f8dab06176f15c10fb4ec13eebaa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5a4f8dab06176f15c10fb4ec13eebaa_JaffaCakes118.exe
-
Size
32KB
-
MD5
b5a4f8dab06176f15c10fb4ec13eebaa
-
SHA1
36a2ae912c50f026620138f74184225390909954
-
SHA256
a89147134168b642e5f59acfc6d0b85bd412ee3f88b14e213b8ee1a8dbc45748
-
SHA512
e5ed1fc212dfb36f8c3c6049182f192d3954789adfc5d4e9b2dbfc20d978d8926be4b164399efd6c03fcdebe6511dd3885870a992439708be7ed049211844332
-
SSDEEP
384:w0MWeGp0HmRM2pBNE1uHI9uFCCenhKDA49qmET:w0MWaHmRMsAwwuJenKxkh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5a4f8dab06176f15c10fb4ec13eebaa_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1316 b5a4f8dab06176f15c10fb4ec13eebaa_JaffaCakes118.exe 1316 b5a4f8dab06176f15c10fb4ec13eebaa_JaffaCakes118.exe