Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
cfc6ff24f78fcbe15ca38019c00a7477_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cfc6ff24f78fcbe15ca38019c00a7477_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cfc6ff24f78fcbe15ca38019c00a7477_JaffaCakes118.exe
-
Size
40KB
-
MD5
cfc6ff24f78fcbe15ca38019c00a7477
-
SHA1
06e23dfd7b39ad99ff004877e82eb3590afed0b5
-
SHA256
0eb6fa32164c5135e730fa990bf904c424336550f64dc77e5a7ae7c64312c411
-
SHA512
5a889d2ff4f4c55abeac7a515f92542d7f62c694d7954af0c563f7381ce0e2f75e99f89698164ac5a259f2e6ab8998f886862172d069b7529abeb7879e19be86
-
SSDEEP
768:FfsK5sAQPqv25Drs8iDZFptyWzoksLq025:ZsKSL22yNzodm025
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfc6ff24f78fcbe15ca38019c00a7477_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4476 cfc6ff24f78fcbe15ca38019c00a7477_JaffaCakes118.exe