Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
ba1bcab43ada50f13d624071839946f2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba1bcab43ada50f13d624071839946f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba1bcab43ada50f13d624071839946f2_JaffaCakes118.exe
-
Size
28KB
-
MD5
ba1bcab43ada50f13d624071839946f2
-
SHA1
d65953030decce98b862cd37a84263105b36a22d
-
SHA256
e586e2e121addcbf111ec612794b6951d535d0335b52083c2e88c2863086be57
-
SHA512
22fb53dc9a097d1e2d3e61b2bb0163da5db9e9b8dbe3179d008308d9fa04cb7f830890ccab533222c5bb8176a3bc07f32db4f01e58b03c545476adae2a200fc3
-
SSDEEP
192:zzOq90us2ZlRGG4JYoWsHbuH55F99nleg+Q6HvSvCSLbg+mCve7PPvUoynyzyV:dGuzMJu5FMQHrfmJPPcwzyV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba1bcab43ada50f13d624071839946f2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1620 ba1bcab43ada50f13d624071839946f2_JaffaCakes118.exe