Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
fb8d67f80521c4a590b605350b97e8c0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb8d67f80521c4a590b605350b97e8c0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb8d67f80521c4a590b605350b97e8c0_JaffaCakes118.exe
-
Size
970KB
-
MD5
fb8d67f80521c4a590b605350b97e8c0
-
SHA1
f53bff658a664da51bde5b4e92ba6ed47da83461
-
SHA256
7e3226ef254f30b462c44dd7cb95d8b4ad82c999590a96bf09becfa159aac078
-
SHA512
3f2cac02b1f3352f5a77436996cf2c835d145f8337c797020734029738bb983ab9fe4956d3e4aa5e337cf9d0c987cc0d64b92302c66d8cc0b0a711f5fd8cf258
-
SSDEEP
12288:1W6DNzHf3KmjocGqXnLR8u4Dw756gur8ieC8l5eJeefEZOwbWxorbV11rMuZ+Q1c:JRra+cgdSwXiLeTl5e1wb9NrUQ1ix
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb8d67f80521c4a590b605350b97e8c0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3004 fb8d67f80521c4a590b605350b97e8c0_JaffaCakes118.exe 3004 fb8d67f80521c4a590b605350b97e8c0_JaffaCakes118.exe