Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
109680fec6dd57a9cd6796512b83cbe5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
109680fec6dd57a9cd6796512b83cbe5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
109680fec6dd57a9cd6796512b83cbe5_JaffaCakes118.exe
-
Size
37KB
-
MD5
109680fec6dd57a9cd6796512b83cbe5
-
SHA1
620b0a73079e49157fee22d053209d02e5fe1c16
-
SHA256
b38094151fda4da10c5f7e28fb8d365e4c6f8fb3da7b53f30f5c7607098b0658
-
SHA512
102cc781212818f5d4562a84156434798cccbd06b3d8007d89074cf2e859f355dea25b1f1795707df413e6b279fa8e548ae2c9c594c79a6dbd8c3543993483df
-
SSDEEP
768:9udVoZoOSrYdyT7NuTfy8Q3A7DqV8XLD9XS7uVR:gfOwGERu7uiNi8R
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 109680fec6dd57a9cd6796512b83cbe5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3112 109680fec6dd57a9cd6796512b83cbe5_JaffaCakes118.exe 3112 109680fec6dd57a9cd6796512b83cbe5_JaffaCakes118.exe