Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
e15cc96a67ff4327d3ce3d29f49e0a10_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e15cc96a67ff4327d3ce3d29f49e0a10_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e15cc96a67ff4327d3ce3d29f49e0a10_JaffaCakes118.exe
-
Size
40KB
-
MD5
e15cc96a67ff4327d3ce3d29f49e0a10
-
SHA1
d6ef4e3fae74a2d25ade2ff42200817c6b781a77
-
SHA256
d6cfdce3ab9ba22e9269d4e8ccef044485ed51f4114eef5d6bcadfe72c61d0ff
-
SHA512
ccacfe8ca801d459e559691a3da70a5d18165d559dea6749537db41c13da98fc1923c2ecdc49e2deb78f3e56b101d1f4cf06719cd15c792b16ebabbb4d18b07f
-
SSDEEP
384:CmnDpjY+l3EtaIJ/74I9UwFOE4ezYYcedam919ygKJIvempxIeTf1LSja:CQkp/cI9UwFCezYYceL919WJixIS9Sj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e15cc96a67ff4327d3ce3d29f49e0a10_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2340 e15cc96a67ff4327d3ce3d29f49e0a10_JaffaCakes118.exe