Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 15:10
Static task
static1
Behavioral task
behavioral1
Sample
faa2f649ba5002724f05586589f72587_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faa2f649ba5002724f05586589f72587_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
faa2f649ba5002724f05586589f72587_JaffaCakes118.exe
-
Size
24KB
-
MD5
faa2f649ba5002724f05586589f72587
-
SHA1
8b5737fb78848bb55c20306047e12ea948f87f80
-
SHA256
88af98a152193663c54e367736c7d81595e5cc217938ee173eb5ccec8ed0584d
-
SHA512
64c6a0c32dd340d5211327f889930f78c7d3856a42ee746846fa4bccd43e9843bd8f9a7174dc3b8e0c8841572669902c5c07d35979a80520b4b33de1d8b283b3
-
SSDEEP
384:QYylXFWeLW4Fo3masCzLsoNNIV5nzKPSYP0:QYylIe64FoFzsoEVdeKc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language faa2f649ba5002724f05586589f72587_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2936 faa2f649ba5002724f05586589f72587_JaffaCakes118.exe