Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
c885c36cfa943ce9aaf2e38e27774190_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c885c36cfa943ce9aaf2e38e27774190_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c885c36cfa943ce9aaf2e38e27774190_JaffaCakes118.exe
-
Size
28KB
-
MD5
c885c36cfa943ce9aaf2e38e27774190
-
SHA1
a9acb842fd581043103827fdc976d9f5b5550cd8
-
SHA256
7ee0432f654b9ae2534e48affa5f05726a42e91447538b1f1f12e7fe482f5c5f
-
SHA512
b5191c5a3a8f1356a4c527b0b9d53544d316231bbddae232f61ec695bdee70497d525bad19a4a5b5037863b6cca88fb08f27ad44f00d50fca027c6d1210b1b39
-
SSDEEP
384:KQ62FJeJLWAeCOEwProDaj3Gztwos0DJjthTD3L9GMkEtlDP4JC:KQ62zDx9ESj3joFtjthTD3L9GMkEfgJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c885c36cfa943ce9aaf2e38e27774190_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 772 c885c36cfa943ce9aaf2e38e27774190_JaffaCakes118.exe