Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 23:34
Static task
static1
Behavioral task
behavioral1
Sample
e1422a2716f2bf1368ecdd0752a310f1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1422a2716f2bf1368ecdd0752a310f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1422a2716f2bf1368ecdd0752a310f1_JaffaCakes118.exe
-
Size
88KB
-
MD5
e1422a2716f2bf1368ecdd0752a310f1
-
SHA1
49750b7a96b18e932767b432970ad0e31e758359
-
SHA256
57ed69ed9b1f9212195862534e2b61864a4d0233d4dd8c2866e3d6173396fea1
-
SHA512
98d055b2b8c7192c6a23d5a277b2310857f0c1804a3179e1d7f8680a8843451b649aec8376860c113006e75363536996e834ed21c2a608ddcec2226598dc993e
-
SSDEEP
1536:fgfaCGe228JBJBpBUM0M0cHP3/nnXaI117i4WzqObn5XbHpiOGArgfF:fK0KI11GlmOVXbHpvhrq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1422a2716f2bf1368ecdd0752a310f1_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1348 e1422a2716f2bf1368ecdd0752a310f1_JaffaCakes118.exe