Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
d464ab3b89965ddf549c949751c7df01_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d464ab3b89965ddf549c949751c7df01_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d464ab3b89965ddf549c949751c7df01_JaffaCakes118.exe
-
Size
44KB
-
MD5
d464ab3b89965ddf549c949751c7df01
-
SHA1
a890daea5df1bf5050b31d53a0b818f8e46afab1
-
SHA256
f742466ccb0f7dac367be9466fc64db53cff1322ff3651c250f76516cea3f2e5
-
SHA512
a04e6c169f6f672ede9a786aefb4874a4672871a23f121c63f777053ce31b045e5a26e62ada9a15479dbba5fa40297e12cb4cce2e9719ba7ae21c4c6c32e33bd
-
SSDEEP
384:pdgWyvlE+Ri0KBuhNnmPe1xK0+VBPefAJS8xgm6RS+wA8lwQA:p2NTi0KBoNce1xK/PSAJS7m6YKQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d464ab3b89965ddf549c949751c7df01_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1348 d464ab3b89965ddf549c949751c7df01_JaffaCakes118.exe 1348 d464ab3b89965ddf549c949751c7df01_JaffaCakes118.exe