Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
bfe4891fa67dc564b39d4c0d952609db_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bfe4891fa67dc564b39d4c0d952609db_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bfe4891fa67dc564b39d4c0d952609db_JaffaCakes118.exe
-
Size
48KB
-
MD5
bfe4891fa67dc564b39d4c0d952609db
-
SHA1
647014f99fcdac33d07f5d1ebadd9a0d9911742a
-
SHA256
30e3658e30a74852823d8ec8fb6fdf162269afe01ac56e64fefaa756a158f2fd
-
SHA512
d6f7bd62e79db85716b3d204d1ffe16282d4d64879e04fd1bc56adf4e73a359039830a37cb2aaf530bd3987bdb937acd9e81e66acb5fdde17966908b4be2cd18
-
SSDEEP
768:1tXOcl3ICm7s2Lv1Zv12SAhKuXMHYiARC7sQ8vGCc3fAR1GGWB4:1t38Rn2SAhKuXMHYiARC7sHvGCc3fARD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfe4891fa67dc564b39d4c0d952609db_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2308 bfe4891fa67dc564b39d4c0d952609db_JaffaCakes118.exe 2308 bfe4891fa67dc564b39d4c0d952609db_JaffaCakes118.exe