Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
11c28ef1bd5b8c752831f1845e94d24a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11c28ef1bd5b8c752831f1845e94d24a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11c28ef1bd5b8c752831f1845e94d24a_JaffaCakes118.exe
-
Size
240KB
-
MD5
11c28ef1bd5b8c752831f1845e94d24a
-
SHA1
5f0f8e83fd5e87681ec726eb247b77fdffb24537
-
SHA256
bd682427775147cc02f76e0b882a559740791f18ab1a7493a5a49d2eae52ba22
-
SHA512
a47b86b0ddef85efabfbfb5d8ba542d0c14ab64c5a69fa2add63b4b3c55dd462e5ae30c547c341a053f8bb09f595880f97b9d10abce7ae6a5023076e894bd913
-
SSDEEP
6144:v5Hi8ZYRdKtKn0WpGm2/KZ8s1IwwIODdqIOM+gZEP:v5HzZYRIVWpXAY1HOxqI1ZEP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11c28ef1bd5b8c752831f1845e94d24a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2080 11c28ef1bd5b8c752831f1845e94d24a_JaffaCakes118.exe 2080 11c28ef1bd5b8c752831f1845e94d24a_JaffaCakes118.exe