Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
dcbd263c7c7f7732bb79dd14115b302a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcbd263c7c7f7732bb79dd14115b302a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcbd263c7c7f7732bb79dd14115b302a_JaffaCakes118.exe
-
Size
36KB
-
MD5
dcbd263c7c7f7732bb79dd14115b302a
-
SHA1
453ad47029748ed5c38f89abd927d2eb0bbda104
-
SHA256
813be18272e72c752c0bef558ef2130e5b2798390eff52e1040f3164515ec06a
-
SHA512
9f5947ac655397e3890b3404908fd84ae5a05e52082633aa488f83bbbc704ab170880c50dc4d806d471a630ed978e7fc60b3ded5391210f3870b9b93156eed66
-
SSDEEP
384:smgOOfCW5plhNqHlwgShj/lDo3N7xYrWu7lAkx2Gs2/97fuG6pEvCNDZSnVH:/OfCW5FjfZMd7xYreCF7fKpEa9YV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcbd263c7c7f7732bb79dd14115b302a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2516 dcbd263c7c7f7732bb79dd14115b302a_JaffaCakes118.exe 2516 dcbd263c7c7f7732bb79dd14115b302a_JaffaCakes118.exe