Analysis
-
max time kernel
11s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe
-
Size
276KB
-
MD5
25a1fa593e9db7717ff6b2c2070fe26c
-
SHA1
15985603d194ab795290313fabfc6b2746968b14
-
SHA256
f2b7570e5225bc30e3d2128a147a9bf891600d8868312656ff53fd3842e601d2
-
SHA512
8b413f306fa36eacbda6e41d747522906da8bc0a335bc8a351211523b574ab0497b3ec6a254d964d4735f79c3c05e3c997ebf13df57565ba007711cdbf247be7
-
SSDEEP
6144:TaLs+Awsc/mev7aBPon/xlpKJ7XaO/Cy:Ta4+ApLev7aBi5lyaO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1288 25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe 1288 25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe 1288 25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe 1288 25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe