Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
d48637d2efd3f143d70cf093cf742e91_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d48637d2efd3f143d70cf093cf742e91_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d48637d2efd3f143d70cf093cf742e91_JaffaCakes118.exe
-
Size
24KB
-
MD5
d48637d2efd3f143d70cf093cf742e91
-
SHA1
093009793f0dd07a475a429697bc3778f82ccd28
-
SHA256
5f27ee036b106af98acee776d87c34ce473ff62a2cd95b1e0a7b883c90184a65
-
SHA512
3337d2b48cfb0cc4398aa67c704f679e214340b87c90235a029473c51eb25470ad73c2c312a9a3c337b4e71b8c69ea82b86353f8fe8e8171b1f7335aa8520e9d
-
SSDEEP
192:U5tt+ELGsDi8DHbpI3RZLt9FgEmaNjZoW3DwraB/9K:U5ttDD74mVaNj2W3Dwre/9K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d48637d2efd3f143d70cf093cf742e91_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3064 d48637d2efd3f143d70cf093cf742e91_JaffaCakes118.exe 3064 d48637d2efd3f143d70cf093cf742e91_JaffaCakes118.exe