Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/09/2024, 00:31
Static task
static1
Behavioral task
behavioral1
Sample
d756d616ddf5daa5345eb88ad0d1ee8e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d756d616ddf5daa5345eb88ad0d1ee8e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d756d616ddf5daa5345eb88ad0d1ee8e_JaffaCakes118.exe
-
Size
62KB
-
MD5
d756d616ddf5daa5345eb88ad0d1ee8e
-
SHA1
0aa88df4b3fa32e9a3dc9397107e1f0fd6e8ac88
-
SHA256
9d81e0d2dd5f6a7851498aec1c6631ee093f596cafb66de4f0b73792a5cf59f1
-
SHA512
72d0c87b5fe3ce93b6adc76eab73728d0e926614c574ae9e5a50e1554868127e456a601041c067f427e0e77e1e5d1a798d93a54256a252dfd095b92308c917dd
-
SSDEEP
1536:z4o09777+hH2NbYEmF6yUH3qK1mpo9eI/eTI2hbP1F5:co0N76hH25YL6yklwoT/YI0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d756d616ddf5daa5345eb88ad0d1ee8e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2408 d756d616ddf5daa5345eb88ad0d1ee8e_JaffaCakes118.exe