Analysis
-
max time kernel
134s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
b6c1eef55d42059c49a3727521eded77_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b6c1eef55d42059c49a3727521eded77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6c1eef55d42059c49a3727521eded77_JaffaCakes118.exe
-
Size
772KB
-
MD5
b6c1eef55d42059c49a3727521eded77
-
SHA1
0e39eea4a68bb7bab9026967dc6213a301ceb18a
-
SHA256
08a3bbc7484bf6ad8ec5ca6cc2d2827ad2fb9a7ba580031414bb8569a9fc0f92
-
SHA512
ffb0ad826341930dc6cd6cc130d3bc5d61cf05f06fe3fec0527139b9bfbb277cacabf8d19bc21695ca497127da3fdea235240c691d24f7590e8af31f7e0e84f8
-
SSDEEP
3072:aqdct76Jj9jEs5nOAr9BYoZaz9x4Uno6pdQiHpSWn+PuL4eBo/TsqU69pTgj4G7E:TTrQOTgSzEjLJxv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6c1eef55d42059c49a3727521eded77_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1216 b6c1eef55d42059c49a3727521eded77_JaffaCakes118.exe