Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe
-
Size
25KB
-
MD5
eab9418c584b46a3ee29bccec62a7a71
-
SHA1
c311739703175c2e9adeb208e8c38f8f9008f660
-
SHA256
2544d441f11aedfa7cc0e9b1ac783005086d7e5e25333e38ae2bfc149bdd1fe1
-
SHA512
05f26a2692eefec6ab7a5140f3bf9b041e0ba18eedeb7aa8ab03d4be0c20abd5cfeb129493def8fb45a52d20afaff5da0160ed33a4c50e856f41710d4be74015
-
SSDEEP
384:LTu8soPGPqTLSX0SyJzsFrRveJ2UocUB/PBhBRhOF8I40zm:L5PTTQ0A5R2ZocUJZhcF8I406
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2100 eab9418c584b46a3ee29bccec62a7a71_JaffaCakes118.exe