Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
ceaa6e34e44f3f4944a39058023de91d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceaa6e34e44f3f4944a39058023de91d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ceaa6e34e44f3f4944a39058023de91d_JaffaCakes118.exe
-
Size
160KB
-
MD5
ceaa6e34e44f3f4944a39058023de91d
-
SHA1
8378f3f8d4b0a3ff72ddf415f886b42eb522e0a2
-
SHA256
51fb05443e049d5508930e6cb36425027ad6689ad7da199b45537afadadda89c
-
SHA512
e3e084a8a2e9fca6ff501bba33c97864b50ff811fea1452ec4b11f452746b43e6ac209310739e891b466b45f44910555d64a49d83a9aa2527411a1301f89fd2e
-
SSDEEP
1536:/aA2qpdFgIIIIiNhdSwsn4k5g8YmZfK1w+GDIIIIYeupn2:aqpXgIIIIOro4og8YmZC1fqIIIIY1p2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceaa6e34e44f3f4944a39058023de91d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3028 ceaa6e34e44f3f4944a39058023de91d_JaffaCakes118.exe