Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
baa876216505a2e207c1d99edfe73cb5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
baa876216505a2e207c1d99edfe73cb5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
baa876216505a2e207c1d99edfe73cb5_JaffaCakes118.exe
-
Size
27KB
-
MD5
baa876216505a2e207c1d99edfe73cb5
-
SHA1
e2212bfd8b38da07c8784c0500dfacaa6bcf3c2f
-
SHA256
485ee41e5b772acd60495e54698d1d973bb1d1379b0c1c1ca1b9e58ce4746441
-
SHA512
417a318766d6e7dd3f4afbeab00829a05be9af5799a415f9068f368873ff29a495aa79c1f669fc1ce547b818afb214753927eb2ae63c4cc946efe7e0722755d4
-
SSDEEP
768:7JShmQyQftViqZpwpyV4G74+Nkm9bglhek4m8ry64WGHckEF:F+ykjiqHayr4++mC/edry64WG8kEF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baa876216505a2e207c1d99edfe73cb5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1288 baa876216505a2e207c1d99edfe73cb5_JaffaCakes118.exe