Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
d3039235474001f889e6a7096136ce90_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3039235474001f889e6a7096136ce90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3039235474001f889e6a7096136ce90_JaffaCakes118.exe
-
Size
196KB
-
MD5
d3039235474001f889e6a7096136ce90
-
SHA1
d9019c5daef2e7e3e582e8b378da29d2e34035f2
-
SHA256
cf154217504232d8a6ae6cc47485219a65a5ee6416752c5403cb25cf0ece8525
-
SHA512
4df9d8edbcb64242908f732cb36f68a056209b738be0217ff18ba30c41623433e4684fdaaf211fa776f0069bfd96c9ba4da881a253143f856e34267bda366f7c
-
SSDEEP
3072:m3GsRXnJwF9LUYMYt8Io4fNUg49iCF0USaYpwvt8mi:AbRXnuF9d8Io4lG9iC5RRV8m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3039235474001f889e6a7096136ce90_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1380 d3039235474001f889e6a7096136ce90_JaffaCakes118.exe