Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
2c85c7f7e1e394eb4b2500609f1b18bb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c85c7f7e1e394eb4b2500609f1b18bb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2c85c7f7e1e394eb4b2500609f1b18bb_JaffaCakes118.exe
-
Size
28KB
-
MD5
2c85c7f7e1e394eb4b2500609f1b18bb
-
SHA1
49a9f907bbb2dc54620cc74434e3b6bfcc0298f3
-
SHA256
ae9ac7bbd4839d86b8d4e2a421149d6a6aebdac92b31ecab351e01f3230488eb
-
SHA512
837785d4899f231ed15fa1f43c322aa32263a905712efefa34e4e5a269a0c416daea1acefef2bd28c50451e9d9cb1798646a1a21adb0b35493bcb6b0604b7b52
-
SSDEEP
384:2n6dnSB0s3AbmHipVGSpsgvXkQBmy21uE:26dnSB0s3AyHWA1u
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c85c7f7e1e394eb4b2500609f1b18bb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5088 2c85c7f7e1e394eb4b2500609f1b18bb_JaffaCakes118.exe 5088 2c85c7f7e1e394eb4b2500609f1b18bb_JaffaCakes118.exe