Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
d59a9f05211aee67c4c590c9f3d74278_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d59a9f05211aee67c4c590c9f3d74278_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d59a9f05211aee67c4c590c9f3d74278_JaffaCakes118.exe
-
Size
216KB
-
MD5
d59a9f05211aee67c4c590c9f3d74278
-
SHA1
429b48d021e70d9a15982db8a6372e9cbd65b446
-
SHA256
09dc8c4c369ead810a932be2c52d9094ded4e4a0dcf9df668fb69b7177ba9a02
-
SHA512
40a96086faddada14de281e779d4d7d23fab62c794911a357b34d073907e5b40f38a1564cd20a2f8131477f8642d65e9ba60dc13fb38aa4531abcc25935dbea1
-
SSDEEP
3072:XVb/LPMa9nL2avCnNH6Fs97FzAf2J7yd9vsOcRz0domfhPghv:XVzLPZL2avoHL9Ft7eNP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d59a9f05211aee67c4c590c9f3d74278_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 d59a9f05211aee67c4c590c9f3d74278_JaffaCakes118.exe 1600 d59a9f05211aee67c4c590c9f3d74278_JaffaCakes118.exe