Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
035d74693b2586d5cd4f8a50cd151568_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
035d74693b2586d5cd4f8a50cd151568_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
035d74693b2586d5cd4f8a50cd151568_JaffaCakes118.exe
-
Size
66KB
-
MD5
035d74693b2586d5cd4f8a50cd151568
-
SHA1
114f7c138f22915090a88ec1a900621ed832d0db
-
SHA256
251476cbfee3f00a6531398de5c8fd512b00c5c9d3cc4ba5d072f124453a631e
-
SHA512
45f97d4b2dfae3e2fa3eaa095c8bbcba648827dd2ccbb62c9119c8ee7136eab682ab7d7c5b90b3087c34457837c77d6f71f910390eaab0c5116d173dd1d66fc7
-
SSDEEP
384:puqo9Bl0uuBLutbA4rjsWVjbeGDdamJClleaGylF6wB0RwGWm6CimkZR55yyn0:gqo9bnlfJzQ3eapNtmNwL55ys0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 035d74693b2586d5cd4f8a50cd151568_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2008 035d74693b2586d5cd4f8a50cd151568_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2008 035d74693b2586d5cd4f8a50cd151568_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\035d74693b2586d5cd4f8a50cd151568_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\035d74693b2586d5cd4f8a50cd151568_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2008