Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
2767f6564fe28218d2b002c915777ece_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2767f6564fe28218d2b002c915777ece_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2767f6564fe28218d2b002c915777ece_JaffaCakes118.exe
-
Size
208KB
-
MD5
2767f6564fe28218d2b002c915777ece
-
SHA1
5b9d4c4eb8cacdccee56bd39d211ec7e0015857e
-
SHA256
7c481b715bd32dc9f49470845c594fdb106f011acb02f811295e299d6355706d
-
SHA512
09fab8e33f13be1c7f9874011f4c68b15f0b66761f992d000e896e76a6e64aa6493d599bb19a9dc300f895243abba5c3fe73dfa4c1cf949acda383375da8877b
-
SSDEEP
1536:XFqhCnVDg4HA8Ku5fKGAU3X7L8tvHL8SxbvAwDIo03kfNcTJ3qVA0PFSFKxfgNa3:1qgHHTPZi8M8wcopFPFSKx4Na8vQk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2767f6564fe28218d2b002c915777ece_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3012 2767f6564fe28218d2b002c915777ece_JaffaCakes118.exe 3012 2767f6564fe28218d2b002c915777ece_JaffaCakes118.exe 3012 2767f6564fe28218d2b002c915777ece_JaffaCakes118.exe