Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
f6ebe975295976588f3ae8652811d5ed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6ebe975295976588f3ae8652811d5ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6ebe975295976588f3ae8652811d5ed_JaffaCakes118.exe
-
Size
24KB
-
MD5
f6ebe975295976588f3ae8652811d5ed
-
SHA1
b08e37cbf954636ca2ad5e66494a3ac3a41d017b
-
SHA256
5b3f5785aa7d2038bf5f8d1c349a0b37159a4f26c97d6ee28ab696258a6c750f
-
SHA512
0a6dccc7213e0a48269c3071197d3d003aadb916a963bba048f68b3f9f03d3e3cdebe581eb7ddf5760d89135feceeed2ace520484a09186cf83e029a01054bc2
-
SSDEEP
192:U/tt+ELGsDi8DHbpI3RZLt9FgEmaNjZoW3DwraB/9K:U/ttDD74mVaNj2W3Dwre/9K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6ebe975295976588f3ae8652811d5ed_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2088 f6ebe975295976588f3ae8652811d5ed_JaffaCakes118.exe 2088 f6ebe975295976588f3ae8652811d5ed_JaffaCakes118.exe