Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
d64345c2eaae7095055a23150888132b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d64345c2eaae7095055a23150888132b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d64345c2eaae7095055a23150888132b_JaffaCakes118.exe
-
Size
324KB
-
MD5
d64345c2eaae7095055a23150888132b
-
SHA1
40f49cb8553468bca2f95e192dae52ff2638b8ba
-
SHA256
324fe659f0551322ecf2a801d8109dabad4340157a05254ad4f47478b0d175f2
-
SHA512
5c0fd3c0b7e490c9d404ffdd2996b81e73b95840b7dc4416ecc26401183867de27bfad139725a192f3ae5a590178cc776b9b149cacd1ee58dfe6a94684ae43c6
-
SSDEEP
6144:Et0xF8wRSuQ53pGGwi/oHXy1epgJsfv8sOF0b:Et0xM5E7i/oHXCJsfUsx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d64345c2eaae7095055a23150888132b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3836 d64345c2eaae7095055a23150888132b_JaffaCakes118.exe 3836 d64345c2eaae7095055a23150888132b_JaffaCakes118.exe