Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
0c7b818212609da594c2d00341631ad9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c7b818212609da594c2d00341631ad9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c7b818212609da594c2d00341631ad9_JaffaCakes118.exe
-
Size
60KB
-
MD5
0c7b818212609da594c2d00341631ad9
-
SHA1
f730b5c60868219a2dc0a553d61d186c0eb27065
-
SHA256
e3a97f2f2284e5469efcada8a0dd7aec5cdd05471d9d3db492c4a7cbdc4cc2de
-
SHA512
38a0a3b45ab414314b791db1ac6b2be9c618b51682faa025d14868b537023c0861e948b49b25c3310c85bed4a6e3d6322333289003d92fe214af9e7ac4a65130
-
SSDEEP
768:7ErZLkxtxWlsY/DyBJFX8286iX0XskkU5tYHrNbKvSf5hc6bdvr:g1LYDN+XAfiP5hc6bdvr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c7b818212609da594c2d00341631ad9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4280 0c7b818212609da594c2d00341631ad9_JaffaCakes118.exe 4280 0c7b818212609da594c2d00341631ad9_JaffaCakes118.exe