Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
e12ea412eba573bed45d9e44e5fe78d8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e12ea412eba573bed45d9e44e5fe78d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e12ea412eba573bed45d9e44e5fe78d8_JaffaCakes118.exe
-
Size
20KB
-
MD5
e12ea412eba573bed45d9e44e5fe78d8
-
SHA1
921a554d1c0cd9d4b1dae20628ab77a6e5d5cfb2
-
SHA256
28a535055349a8eea8ce5de065f7dd5e71d316d4eadc6422e98176a2fd7c53f2
-
SHA512
3b68bdf86c432ca8ab48412724d069874738113938b74ad0f798dde05fd18da85a07d0d207cd0215d6f0b1a5e8eb6acdeddfc0d564265c2f12af617307ff3631
-
SSDEEP
96:/lxUTzklzEh9bvVkPJ2LMgGD3xYXRjxT9zlO3rmVpbREDRAha+VG4nn1+P:/TowYh9LGRHgq6jHpRha4G4nsP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e12ea412eba573bed45d9e44e5fe78d8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2400 e12ea412eba573bed45d9e44e5fe78d8_JaffaCakes118.exe