Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
fe364ad47240ed89fae30ee3bbeddf07_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe364ad47240ed89fae30ee3bbeddf07_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe364ad47240ed89fae30ee3bbeddf07_JaffaCakes118.exe
-
Size
48KB
-
MD5
fe364ad47240ed89fae30ee3bbeddf07
-
SHA1
545077fe17c451752c9bc904f8fe547047a7fcb9
-
SHA256
1880ad0b5d9dfa8caa17d6473fcf0340a3b61021733ba60916e02ed63f92d3a1
-
SHA512
99206762ed5f6304c4409c75822d77e5e57fd67ad9c8df24e2e57a0bb6272195258ab8d4f37baf956e0503c832c00916811918d95cb5eefae98a9737f94f23e5
-
SSDEEP
768:W01nNe4dTpIwzDwmY0qoCh413BvDHAw/jU4W+3V:3PeaTDzk50qJc3BvDgw/oO3V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe364ad47240ed89fae30ee3bbeddf07_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2380 fe364ad47240ed89fae30ee3bbeddf07_JaffaCakes118.exe