Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
b6eb5a64a49d7e49ef08b8370f9dadc0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b6eb5a64a49d7e49ef08b8370f9dadc0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6eb5a64a49d7e49ef08b8370f9dadc0_JaffaCakes118.exe
-
Size
36KB
-
MD5
b6eb5a64a49d7e49ef08b8370f9dadc0
-
SHA1
6e436c09499b513754fb80bc49dbb1d0e49a5f05
-
SHA256
4d8963b23b6c111e5218dc9aefeebe36ca2941413d57c4a8b02b3669edf893df
-
SHA512
6d9e18f4b9f61af484122af13bdaf4b2a3ede21d5ec94cabf3b243a02250804f995f13bc1110f22c7e030348fb59c803d23bbcacf341e5e2c300281390b555d3
-
SSDEEP
768:dZwOQ4ZlqBivMS99999999999999999999999999999999999999999999999998:f5Qx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6eb5a64a49d7e49ef08b8370f9dadc0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 b6eb5a64a49d7e49ef08b8370f9dadc0_JaffaCakes118.exe