Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
2780424303b5501fa4a3ca0575db7d1a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2780424303b5501fa4a3ca0575db7d1a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2780424303b5501fa4a3ca0575db7d1a_JaffaCakes118.exe
-
Size
191KB
-
MD5
2780424303b5501fa4a3ca0575db7d1a
-
SHA1
82fdf3bd7a141897cfae4b61089a7d64bf280730
-
SHA256
614160cf8272b47e159b3359d556b8d44de88fae37f027212b306e0e2b4283c6
-
SHA512
eff569b494234d12b9b7aa63de587483d722db05174e638beb83d242b7dbabf132246853ecb29834a4af627858b5cfcc177e0020b88ed5cc9a1d16697094ff7c
-
SSDEEP
3072:ks+OAsVMBRaaiYrEvtKVAefoBcNJMveVIU6fMRKb9I85Kvf3jfCkWi2DlQ30H74Z:UmkiYSt0nfoB40eSh0RA9I8UDvWVm30U
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2780424303b5501fa4a3ca0575db7d1a_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 2780424303b5501fa4a3ca0575db7d1a_JaffaCakes118.exe 2728 2780424303b5501fa4a3ca0575db7d1a_JaffaCakes118.exe