Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
da36825091a6c8c4506eaef13d85ecd3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da36825091a6c8c4506eaef13d85ecd3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da36825091a6c8c4506eaef13d85ecd3_JaffaCakes118.exe
-
Size
24KB
-
MD5
da36825091a6c8c4506eaef13d85ecd3
-
SHA1
23945016d23067385a3a01a7efdacbef107f458d
-
SHA256
533528e54f1740e9d833b2d1bc342572ddaeec70d5e401f8f226203c4ee851ab
-
SHA512
9bda9ea863e38ce5a5db07982f3eaa8ad4a555062b98c501b75baf89915e2320a04fe2959c6b34e1a989f881282eedb5dbc20a3fed9150cd1186f197831566de
-
SSDEEP
192:FnD+Znzi1/LCqpSVDKh2TXZf02cKYu+3J7uPFDdICstDQ/H57p+vE:FnSnQLCySV5dTNC7uPFDd7stDQ/GvE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da36825091a6c8c4506eaef13d85ecd3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1620 da36825091a6c8c4506eaef13d85ecd3_JaffaCakes118.exe 1620 da36825091a6c8c4506eaef13d85ecd3_JaffaCakes118.exe