Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
ba353c4fa9352e95910f4129764da58d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ba353c4fa9352e95910f4129764da58d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba353c4fa9352e95910f4129764da58d_JaffaCakes118.exe
-
Size
24KB
-
MD5
ba353c4fa9352e95910f4129764da58d
-
SHA1
4a8cda1bb2085ece31b72272ad2b48bcb5b0bf20
-
SHA256
4689d19b48adf012a212b287f1e89fd80b461ddfebb42dfbc2e947b973ff8a51
-
SHA512
448e0a1d58e01b241cc7fbebeadc55f504e917b5edebc861d32d915e8352ee60d87c6db71bb40abdf084a64be9f1ddb898746a2e37db2ed4e572654f9b968b2a
-
SSDEEP
384:0bZGdYAgpy2eD4dGlvFWfZwihhDENDZ4/RQ1s:0bE+PyQOiq+m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba353c4fa9352e95910f4129764da58d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2072 ba353c4fa9352e95910f4129764da58d_JaffaCakes118.exe