Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
d22bde88a4473e147503708bfbdcc836_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d22bde88a4473e147503708bfbdcc836_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d22bde88a4473e147503708bfbdcc836_JaffaCakes118.exe
-
Size
37KB
-
MD5
d22bde88a4473e147503708bfbdcc836
-
SHA1
65bb25be110423435bd94ed14bf3dbf05e4f052d
-
SHA256
c7bf94124794415d444ab40153eddd995d026b41fefbfbcf8a43b35dbb1b42a6
-
SHA512
a0eba563cb557e756633bb125c3479ee42ae764247ee75cbdb88216222eb1d7a7c160cb65eeb65cfafbf432f850db828667ebc10d9f1b3fd777753c04416c997
-
SSDEEP
768:tvNAkIjFWiiBtUn6M4htsiDNDaWvWjIoe:EkIhWioUn6M4Fx2W+h
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d22bde88a4473e147503708bfbdcc836_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 d22bde88a4473e147503708bfbdcc836_JaffaCakes118.exe