Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 08:59
Behavioral task
behavioral1
Sample
be438b7e1a924aad4379cd0eeed0f344_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
be438b7e1a924aad4379cd0eeed0f344_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be438b7e1a924aad4379cd0eeed0f344_JaffaCakes118.exe
-
Size
92KB
-
MD5
be438b7e1a924aad4379cd0eeed0f344
-
SHA1
b8b20f4895032d8807a11a2040b8c12b5db49efd
-
SHA256
cdb94237e9fbacfc720429de0732d0d077afaa085c6c9c0ba0ba96e1ecda6390
-
SHA512
1f32793dd430a45f3d957e3cee5d41ea132fd8bff47301a4cbb05b974de0b6a54aaf745945a935419ea66666e22d979455014cde7031532e152455c4a3361fc7
-
SSDEEP
1536:2lqMbFTeW+s4+hVM3tNUt46540VdOzq1z35Vt6S:QqMbUpsz7M3Yt46FVdOz+zDtX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be438b7e1a924aad4379cd0eeed0f344_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 be438b7e1a924aad4379cd0eeed0f344_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2124 be438b7e1a924aad4379cd0eeed0f344_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be438b7e1a924aad4379cd0eeed0f344_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be438b7e1a924aad4379cd0eeed0f344_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2124