Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
25110230043abc04221a5f17e2b7dde2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25110230043abc04221a5f17e2b7dde2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
25110230043abc04221a5f17e2b7dde2_JaffaCakes118.exe
-
Size
96KB
-
MD5
25110230043abc04221a5f17e2b7dde2
-
SHA1
ef0de9470877fa11ec134238dd259b5f02160635
-
SHA256
d6d54598130ad2c8846539025f08e0df0c8e2dbb43c95edc71b58179fb91948c
-
SHA512
120b135f7ef7b512989a4e3c027f27a999f676242eb29c7ba51d38f6c66d6973d1233c5666c270a313362d7c260f7422dbee9690856f3f444515b2e0b7e84cfa
-
SSDEEP
1536:xTp51maN/ELCUCIuE9w7UKvgs3SZNw//yktqlm8uTxHOVvyajE4bhWTgl0w2yg:n51lN/6CUCA9hbOOC/yktE2dUyajEcUT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25110230043abc04221a5f17e2b7dde2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1640 25110230043abc04221a5f17e2b7dde2_JaffaCakes118.exe