Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
eac3a342558a1bd9940ebd9b798a2077_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac3a342558a1bd9940ebd9b798a2077_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac3a342558a1bd9940ebd9b798a2077_JaffaCakes118.exe
-
Size
76KB
-
MD5
eac3a342558a1bd9940ebd9b798a2077
-
SHA1
7c62b0e084d42e70089dbb0306dc3e162a056ac5
-
SHA256
82985b3d6493c72ae46639132081b9be72eecd503b4e4d7e4e7a6629f3170088
-
SHA512
1831b05a1719694f23e0154891975fbed361ec44acce890b7eca951bc7f2ba83cc722f82ec0fb9b6af0a6ecb9084d9686e9c4caeac461e4e3a9e03e05ec8dc92
-
SSDEEP
1536:9/Iq9bL2EEUZh7fgGHl+qSkqjxU+4qXsdfva+:JIWbD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac3a342558a1bd9940ebd9b798a2077_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4740 eac3a342558a1bd9940ebd9b798a2077_JaffaCakes118.exe