Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
e0b58864898c3cd08a64230edd3bc579_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0b58864898c3cd08a64230edd3bc579_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0b58864898c3cd08a64230edd3bc579_JaffaCakes118.exe
-
Size
116KB
-
MD5
e0b58864898c3cd08a64230edd3bc579
-
SHA1
8abc4ad0af67289fa18258e3f7dc350fe4c6a82c
-
SHA256
f58644466cc5ab2c376dfc0de91d524dc15c747feb4d7f594636e58b9812cd70
-
SHA512
075c048de8f98a94958754481ab50706af5e3b1b31aaa32dee03bab70cfe73845921b406689574ab1cf061784715a05c004c6e781ae495153ec8507b78abc674
-
SSDEEP
1536:B/Q6/fqo3NFaTpIifu7AOqlj0MLyY38U1t:B/jfqo3NFaVfucOWgc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0b58864898c3cd08a64230edd3bc579_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2036 e0b58864898c3cd08a64230edd3bc579_JaffaCakes118.exe