Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
b8a41a889ed479e5491312e88790978c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8a41a889ed479e5491312e88790978c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8a41a889ed479e5491312e88790978c_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
b8a41a889ed479e5491312e88790978c
-
SHA1
c9d16fface84fd7151004c82dbf427d88cb10bf2
-
SHA256
0d57a724d56e200ee442f2231b60741c80b31b84b1afc9e171a97b28db9e2d55
-
SHA512
60378ce16fcdeef8896bdf50ff0790324c2027e2d59a3b5d5927f0707e8150206deecc876a7dc17e9aea653e431f5b435faba2a35202e2ce60324bcba6006da1
-
SSDEEP
49152:7TF+t4G1X9tQbvbT7FY8+Bm2sDc6DHUdby+ZA1:7TF+t1GbvP7b+KZHsW+Z0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8a41a889ed479e5491312e88790978c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 8 b8a41a889ed479e5491312e88790978c_JaffaCakes118.exe