Analysis
-
max time kernel
142s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
bedd95445b7a19730d7404f2d6a82c12_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bedd95445b7a19730d7404f2d6a82c12_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bedd95445b7a19730d7404f2d6a82c12_JaffaCakes118.exe
-
Size
212KB
-
MD5
bedd95445b7a19730d7404f2d6a82c12
-
SHA1
f1966b5d87ae701c3fe5907ae0021fbaf739d479
-
SHA256
e270f17df571a1ff909fd15fa8c29ac3cf502fec377cdc079b164881a43292f0
-
SHA512
a9e92543c46b73c1cad7d56b475f2eb1ac52a18ea1a66c618003b07c60789a51e8238bdbd73d2e0bc28b9e6cb311ee74dea8aaf7249b4220e3e739151c5b3017
-
SSDEEP
6144:t5vYGRmvpLyhfuSC8WWLNnLVIlbBU5Mk:tpYGRmvGpWGNL6l25n
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bedd95445b7a19730d7404f2d6a82c12_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4436 bedd95445b7a19730d7404f2d6a82c12_JaffaCakes118.exe 4436 bedd95445b7a19730d7404f2d6a82c12_JaffaCakes118.exe