Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
067a5d67e266fd53524c5e286bd7aa10_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
067a5d67e266fd53524c5e286bd7aa10_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
067a5d67e266fd53524c5e286bd7aa10_JaffaCakes118.exe
-
Size
117KB
-
MD5
067a5d67e266fd53524c5e286bd7aa10
-
SHA1
378605e1428abb0ea983eab23655301fb2c420e6
-
SHA256
ed06ab5ba0b31de5370f75ca6f367d60a7ffbf66d1c0010df64fa90d397f7672
-
SHA512
c52e2ac193cb97e06fa760b6e9a29c1a60e09989be40f17842c02d93f5cfde086a1ac64b2bcf6a0d7241d97abee79dfb8700ea64e6f35399600ee8496b53a851
-
SSDEEP
3072:HJd0goWPZz6PANLSOGpC7DLZJQMc69g0:73B6INLUqLoMc69
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 067a5d67e266fd53524c5e286bd7aa10_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 396 067a5d67e266fd53524c5e286bd7aa10_JaffaCakes118.exe