Analysis
-
max time kernel
111s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 04:47
Static task
static1
Behavioral task
behavioral1
Sample
fdd349a767b6ebba2cd6990fcad482bc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdd349a767b6ebba2cd6990fcad482bc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fdd349a767b6ebba2cd6990fcad482bc_JaffaCakes118.exe
-
Size
880KB
-
MD5
fdd349a767b6ebba2cd6990fcad482bc
-
SHA1
2bf6de7bfb43f80747b44ea75f6d57158a64e3b6
-
SHA256
60089d1893bb057a110ceb125a0ea9ca4f5056bc6da87ec897bbbcea3663d693
-
SHA512
e6c4153f9b4af2e89c8cd6519b67d42b89e47d3aafa2836ec655aeb788375ba9ad49bec48acf25092e8a354952ff9e583ff6394768e4fba93c861c5ea9b0c100
-
SSDEEP
12288:tUtTAON7aNmavScdezW8LkHyIer2ZGPT5MQh/428BAcWSz/ictQ/C0NHPLU:+hcE3cd4bLkHyIeqITD/87h7htQ/nN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdd349a767b6ebba2cd6990fcad482bc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1976 fdd349a767b6ebba2cd6990fcad482bc_JaffaCakes118.exe