Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
41e498ebba9e8a66edd2db2c98438bf2_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41e498ebba9e8a66edd2db2c98438bf2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41e498ebba9e8a66edd2db2c98438bf2_JaffaCakes118.exe
-
Size
964KB
-
MD5
41e498ebba9e8a66edd2db2c98438bf2
-
SHA1
f0f2dc3a53ea751eabfa007349cd3ba07d13411a
-
SHA256
9f78735a030e75838c5a823324e53daddc773efd6318568089aaf3b14291a1db
-
SHA512
3ba5a0e159b8ec6e153f80a0dcf4bd7760443e0714a9ee17fa264b4d94056f45587b53cc5494e77ea386324eb643932d2b2fff83f10d31cad786aed39bee4e22
-
SSDEEP
6144:Pj+zxCMoORsxdRRpMByt2sVQe63/58YQojDuUltTojDuUlFyWopD6:Pj1pzRykhrWnQeDuUltTeDuUlFZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41e498ebba9e8a66edd2db2c98438bf2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4996 41e498ebba9e8a66edd2db2c98438bf2_JaffaCakes118.exe