Analysis
-
max time kernel
71s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
dc11e8c380da86ba66fcad18b575ba49_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc11e8c380da86ba66fcad18b575ba49_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc11e8c380da86ba66fcad18b575ba49_JaffaCakes118.exe
-
Size
16KB
-
MD5
dc11e8c380da86ba66fcad18b575ba49
-
SHA1
c482ba619d0e88f820bb193ee7a41b8e6a4b121d
-
SHA256
387f619aeed134777926243b76a43480cbfba437290660a2b924589607f97525
-
SHA512
97d9aa54250d9c9e790c4d2b2916a7a0b978744b61ebf088303db1a841388bda5c11fbb76460d018a59517322f61fd5c146d2cf7e875eeabce80434eace72a5d
-
SSDEEP
192:xdKMCIHKrtDINynT+vqS34G47uGlp5S9CIHKrtDINynT+vqS:nqTHIwSRqT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc11e8c380da86ba66fcad18b575ba49_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1592 dc11e8c380da86ba66fcad18b575ba49_JaffaCakes118.exe