Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 01:28 UTC
Static task
static1
Behavioral task
behavioral1
Sample
08415400be1d46a0ab2cd501a087a7e8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08415400be1d46a0ab2cd501a087a7e8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08415400be1d46a0ab2cd501a087a7e8_JaffaCakes118.exe
-
Size
44KB
-
MD5
08415400be1d46a0ab2cd501a087a7e8
-
SHA1
86be9fa49019c8508a57ac2fe59f1e5dc057e356
-
SHA256
e1be34734707b5a208c56378635b987bbc5043e72dfa3c03a857b5e3fa53381c
-
SHA512
0d9596f4ee4b32b5031c79c9dcbb0679ff589454d90b890c9e4fed9ea613c7f066cde18dc694b70e02b7298ced11c03af42ad3067c0f5e30e95e091f3e91e921
-
SSDEEP
768:mfk94gfA3vyyWr3CCPVdJQ2L0N++B752Kd:m8ugfA3vy20dJQ2Yrt2y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08415400be1d46a0ab2cd501a087a7e8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2056 08415400be1d46a0ab2cd501a087a7e8_JaffaCakes118.exe 2056 08415400be1d46a0ab2cd501a087a7e8_JaffaCakes118.exe