Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
4616e6fb8c99716a1db7aa894c667a86_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4616e6fb8c99716a1db7aa894c667a86_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4616e6fb8c99716a1db7aa894c667a86_JaffaCakes118.exe
-
Size
24KB
-
MD5
4616e6fb8c99716a1db7aa894c667a86
-
SHA1
f5e34981e628c3200687378d8a1589abccc3f911
-
SHA256
f3e74d267ff20628e8e30f91532c97c611112b9c654ed6f3d369d68c78c45c52
-
SHA512
a48cea4c830e3cfe587c1d61796e2f7933a2fbd49099838196c978e1e6443f0cd023a356875b5c6b102039ea6c502064b8bb504f19d2f6026679d1a8a4135a70
-
SSDEEP
384:QxlwIU2CrZioP26Z+dfd1k12j2N5OFZR:QxlwIUfr+64WfYZR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4616e6fb8c99716a1db7aa894c667a86_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1580 4616e6fb8c99716a1db7aa894c667a86_JaffaCakes118.exe 1580 4616e6fb8c99716a1db7aa894c667a86_JaffaCakes118.exe 1580 4616e6fb8c99716a1db7aa894c667a86_JaffaCakes118.exe 1580 4616e6fb8c99716a1db7aa894c667a86_JaffaCakes118.exe