Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
da27ad42d648dc10888685b19d8814ed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da27ad42d648dc10888685b19d8814ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da27ad42d648dc10888685b19d8814ed_JaffaCakes118.exe
-
Size
132KB
-
MD5
da27ad42d648dc10888685b19d8814ed
-
SHA1
2f1104ee8ae853421bd5737ae8e98c51895d08a8
-
SHA256
d5b0b7b717865c53915a97f6eebe3e267108008c2e414d206f82b550d19416d2
-
SHA512
d5c8a02b4a9389292221c81458eabd9d2065b6421b03c541a8f11f16d9eb20c7a68dd4dd617048f0d708b75ac8cb3b68e3f5018a8820ae2f70df8ec9d5830bf1
-
SSDEEP
3072:SGUmLkldtDOY2CT5Vpg8E5MTDHwUWpkCVeynPxcnCzysKBiZSR:ZUVZ2CThg8pHwUWfV1nPxOCzyB8q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da27ad42d648dc10888685b19d8814ed_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2504 da27ad42d648dc10888685b19d8814ed_JaffaCakes118.exe