Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
2aad0f843e500f9835aaf9c3d8409d07_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2aad0f843e500f9835aaf9c3d8409d07_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2aad0f843e500f9835aaf9c3d8409d07_JaffaCakes118.exe
-
Size
20KB
-
MD5
2aad0f843e500f9835aaf9c3d8409d07
-
SHA1
d1c37f3db5054117e42ebb20d7ff435b83fd3ceb
-
SHA256
e8305abca58b8b2a0a5c628182826afb1740388280d7380963f5df8997d53871
-
SHA512
366e62916c1b4d37c011c1bcea88cf2867266b92fd942d5037c4e6fdf198f4d8a169bb30c6745c23fd147dd7e5ae03e60232ffab116c89bfedaf0d8ba5f3ecea
-
SSDEEP
192:Cj12+gTWvGfG3CYwJygPfgCMiTwlbM2N8LMAsT93YOUdc0XFX:A14xfICWggAUwMAsT93YOUC0XFX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aad0f843e500f9835aaf9c3d8409d07_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3060 2aad0f843e500f9835aaf9c3d8409d07_JaffaCakes118.exe 3060 2aad0f843e500f9835aaf9c3d8409d07_JaffaCakes118.exe