Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
d28226585d95d204cbe86a58cc9663df_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d28226585d95d204cbe86a58cc9663df_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d28226585d95d204cbe86a58cc9663df_JaffaCakes118.exe
-
Size
32KB
-
MD5
d28226585d95d204cbe86a58cc9663df
-
SHA1
accd8ff99e27d5ef35a735619d9acc26d4872bb4
-
SHA256
c1231ba53536c96180fd20f778e8d42f88c15d48d1b7056b3773d4a7b6eed033
-
SHA512
3a2ec2fd22240c40667826bb7d4bd6408be3b654410e2b51097f037644f06c3cba4764de7908f6f10f3a47717e902c9cc3dc2cf324d4eceadd7872001a6d59e7
-
SSDEEP
384:/AKyp9r9UlO8S/z23pyTMNsnJAOFhv37JjSD/zdrI:Ap9resT/y8TMwAOfzJs/9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d28226585d95d204cbe86a58cc9663df_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1552 d28226585d95d204cbe86a58cc9663df_JaffaCakes118.exe