Analysis
-
max time kernel
111s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
fcd086e8f0c70b722d2d13ff4421e785_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcd086e8f0c70b722d2d13ff4421e785_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
fcd086e8f0c70b722d2d13ff4421e785_JaffaCakes118.exe
-
Size
28KB
-
MD5
fcd086e8f0c70b722d2d13ff4421e785
-
SHA1
f97fa4c9442af1472a2aea6d91ce97f66e0177ec
-
SHA256
a599c3e8f1c320b68980e8557af33b12d00ce331b116db74453043014b1ef269
-
SHA512
25e63c0059aaae9d5a1e03da722ad16c2584130e718801a86e704fdc619e3bb0a018bdd41ab55e46e28637516b5312f43e899efcc154db17b5e6f7371483343a
-
SSDEEP
192:crb/kE4CxyGYScJVLIdAe0zd6LH5ASpCV46EHNgI2Z1rpyh2PcH0YD94Lb:MsE0mcodaquEb2rDPchD94/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcd086e8f0c70b722d2d13ff4421e785_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2564 fcd086e8f0c70b722d2d13ff4421e785_JaffaCakes118.exe