Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
e11e8982823d7271f47b673f58a104e8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e11e8982823d7271f47b673f58a104e8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e11e8982823d7271f47b673f58a104e8_JaffaCakes118.exe
-
Size
244KB
-
MD5
e11e8982823d7271f47b673f58a104e8
-
SHA1
e274c5d2e959f30e1db6e397202f1bdfcbe7d276
-
SHA256
9127fb6762d5d1b7fd74d2ae642a1ba80aef31102c0f570893718d2308178531
-
SHA512
64005422a2dc6dc1d08d20c15c5b8777d0d0eef9acff0f19f0832b0ffe0efbe26ec51844d2cd62c7b9887651ad4d5d512095ff819380608ff7a035e64efe6830
-
SSDEEP
3072:8oJVfJFSFCkzoJVfJFSFCJPk9We5wH7UFiJFCcJN:zNyZWNywk/5w04D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11e8982823d7271f47b673f58a104e8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4860 e11e8982823d7271f47b673f58a104e8_JaffaCakes118.exe