Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 20:55
Behavioral task
behavioral1
Sample
4424d086cdc0694654e1bf3428aded05_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4424d086cdc0694654e1bf3428aded05_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4424d086cdc0694654e1bf3428aded05_JaffaCakes118.exe
-
Size
72KB
-
MD5
4424d086cdc0694654e1bf3428aded05
-
SHA1
83827a7810e9b81f79455145e404af1e027240f7
-
SHA256
9d13322f69b1ea02698c3eb53e584dd988864cb7aa2d7319c860704ef0b7a8af
-
SHA512
b50b5af098ab13bf9d80eaff649fb98c74337f6efffc6b2853fc269ade7a0a5d2bffce77ce8672f4d58c7975c117391d92f38513725aeb5841d4d95510724394
-
SSDEEP
1536:/UPAHDaEjmj0YDqH8qwFRUtTYlfkiU3njEOII4cBGwMhj3A6JugY:c5EPYbVFRUJYSARIUBhj32g
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4424d086cdc0694654e1bf3428aded05_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 276 4424d086cdc0694654e1bf3428aded05_JaffaCakes118.exe