Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
fc79d6ef99c9e3a05699013cc90e8941_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc79d6ef99c9e3a05699013cc90e8941_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc79d6ef99c9e3a05699013cc90e8941_JaffaCakes118.exe
-
Size
24KB
-
MD5
fc79d6ef99c9e3a05699013cc90e8941
-
SHA1
4e0ad51544b961682622e6cf6e3876ce691650fd
-
SHA256
ddadfeefcfafe3a96b19acd5b1f00701cda74feb29a779470cd31479a8acb621
-
SHA512
0053518acc6e18106b385d1035ccdd8ac2653dbd9473d0c10696d636c32385cac348557444ea2bfbaf83a8ee44a776a1a78a1a009131df1ee50c17c012dc18fc
-
SSDEEP
384:4Oszv70vSuXgZnz3kSuUR6Hcay0TMQ8WhXEts4ZHds:47vy8ttP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc79d6ef99c9e3a05699013cc90e8941_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2276 fc79d6ef99c9e3a05699013cc90e8941_JaffaCakes118.exe