Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
d6f7ffe1d4950c5e61cfc80f738dfc69_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d6f7ffe1d4950c5e61cfc80f738dfc69_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6f7ffe1d4950c5e61cfc80f738dfc69_JaffaCakes118.exe
-
Size
40KB
-
MD5
d6f7ffe1d4950c5e61cfc80f738dfc69
-
SHA1
c2ca6d321ee52926be4d6d1f17270940b6b02079
-
SHA256
4021fa354aa658ad85666460ae30180e3ba729faf3d054fc2fd9a771e7fdaaaa
-
SHA512
5b407cf4eb6697820eb87324b5afec9d888bc0f597f83d8578aba73a6ed600358d35d9a2971dc30ec921d05168cfb032d1d60776d8810264127787731b884e01
-
SSDEEP
384:1m/rBuOn/J15xVihvx5ZMaQah298aooX15Gs1m8eRWh5kNGXDEWynlM:1m/rn/J15xYhv7Z5FSduseWh5RzMlM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6f7ffe1d4950c5e61cfc80f738dfc69_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2408 d6f7ffe1d4950c5e61cfc80f738dfc69_JaffaCakes118.exe 2408 d6f7ffe1d4950c5e61cfc80f738dfc69_JaffaCakes118.exe