Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
fa41b66b579f87e3605a89e665ade182_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa41b66b579f87e3605a89e665ade182_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fa41b66b579f87e3605a89e665ade182_JaffaCakes118.exe
-
Size
52KB
-
MD5
fa41b66b579f87e3605a89e665ade182
-
SHA1
ed3010be723a77fda3d919e104c04492dbc82aa3
-
SHA256
816dfc72a545030a78f72695e370d05cd9bb8fec5b63b56920947a484c9252a0
-
SHA512
e12ffcd51ed5de70fc084fc5f9b44d8d6a80661c2554283cc9faba04cd009eda2ca7b3dd2a471bd9020f0348ff0129a8629c03c5777677404083285b7bfb85aa
-
SSDEEP
1536:KXldlc82OnFBF1NiGnGjvh9cNRslU0sgETl:KeNOnFBFRnswRsmJg+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa41b66b579f87e3605a89e665ade182_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 800 fa41b66b579f87e3605a89e665ade182_JaffaCakes118.exe 800 fa41b66b579f87e3605a89e665ade182_JaffaCakes118.exe