Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
f63d88dfa5989ab88b8f87c9c8036ef2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f63d88dfa5989ab88b8f87c9c8036ef2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f63d88dfa5989ab88b8f87c9c8036ef2_JaffaCakes118.exe
-
Size
3.9MB
-
MD5
f63d88dfa5989ab88b8f87c9c8036ef2
-
SHA1
2b5bc2e4935387cb8af51c7b88ef4b2f59b6fcfe
-
SHA256
8d71d5a99a14d2787d25c5b222f8c359cb9a1a4271dbeef957904229b9b4cf63
-
SHA512
9366b96f73ef771a6b2fa1bc6fd9648ec63e82891f81fe7686f8c852c45115a057cd640f400fd081432af1dd59361ba5e6f7278c37cb1a00086eb65cc6f58758
-
SSDEEP
49152:I+FRBNWQDV8Kp6F8ftDSe9mLdx8kSogcwzKToFPWfYV4T+LeA:IOWuV8KuSog1nWQV4TR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f63d88dfa5989ab88b8f87c9c8036ef2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2968 f63d88dfa5989ab88b8f87c9c8036ef2_JaffaCakes118.exe