Analysis
-
max time kernel
91s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
07808978a907bd367a51bad021afd6bb_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
07808978a907bd367a51bad021afd6bb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
07808978a907bd367a51bad021afd6bb_JaffaCakes118.exe
-
Size
104KB
-
MD5
07808978a907bd367a51bad021afd6bb
-
SHA1
7948e0da725bd679fce173a649bad9bc064a82f1
-
SHA256
d29d405bc63fb323064e648584aa3ad34ed213030ded4e2bd21a3ee702b92132
-
SHA512
b6dba42630e5be81f69adecd0d5192dfddbe8f6435521118e33cd0b22ddc882fa7e75dc135462f31b853d1b8b93f16850b77c064c6e24b400f0a70f85344c91f
-
SSDEEP
3072:2SANPS3qEAfqlV8gXJQbluUkO8Xvf+RYyh6:sEAfiV8KKu4+f+Cy0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07808978a907bd367a51bad021afd6bb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2216 07808978a907bd367a51bad021afd6bb_JaffaCakes118.exe