Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
d01f7f4593171f8b66ec4c0266ef00b5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d01f7f4593171f8b66ec4c0266ef00b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d01f7f4593171f8b66ec4c0266ef00b5_JaffaCakes118.exe
-
Size
24KB
-
MD5
d01f7f4593171f8b66ec4c0266ef00b5
-
SHA1
9dd91fa3af5fd840b5246d0cfdb505fe948607e0
-
SHA256
8d459c379c6d2d9958df0c82b709db700dde0fa50161697e5a8fb11d32232a7c
-
SHA512
6e936a8349893031f8cdb9b4c416a5b32ae2ba97ea87bc09fe1532822cf26f43bc5a0b05e92849c8432260f52a3f4a1e24321842b49c786e78ffc99a4a4445ab
-
SSDEEP
192:/TxyFVEleeK0XIZEuyODHJ++gq1Bh2+mTD9SE81:/TxkEleefXFu1cZTD9SH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d01f7f4593171f8b66ec4c0266ef00b5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4304 d01f7f4593171f8b66ec4c0266ef00b5_JaffaCakes118.exe