Analysis
-
max time kernel
93s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
e14e9399f511b401ed083ffaf781f255_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e14e9399f511b401ed083ffaf781f255_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
e14e9399f511b401ed083ffaf781f255_JaffaCakes118.exe
-
Size
307KB
-
MD5
e14e9399f511b401ed083ffaf781f255
-
SHA1
016239450748a06393090e1c1d16ab25650d78e4
-
SHA256
90bcf663f6ee4a2db703666ba4aa11c9a89c7395f1967498e2f74b6d2a781ac8
-
SHA512
090d4a093588d1d4bc7f47d18d04e8538865f3a72644f5d6429c2212ccb9dc50bf8d768cfc9ac3caa9af40d3c50707277a938bc8affd3431e498d8c16b88aec8
-
SSDEEP
3072:6BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBD:K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14e9399f511b401ed083ffaf781f255_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4380 e14e9399f511b401ed083ffaf781f255_JaffaCakes118.exe