Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
53763c7f10cad6a9583560dd2ddb1090_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
53763c7f10cad6a9583560dd2ddb1090_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53763c7f10cad6a9583560dd2ddb1090_JaffaCakes118.exe
-
Size
52KB
-
MD5
53763c7f10cad6a9583560dd2ddb1090
-
SHA1
c199ab60f4c3a560eb33be4af87be35d656f3e02
-
SHA256
d5aa1167db61321e086dfb1e2591c46e61e618eb40c7957b2817e0275153d0d7
-
SHA512
e2e0d985fbd54b4707b8901c387ef0af8ed0cac4afdba0d3685fe84fb672ba8e12a3e4118245eb63748ad7a036f671cf77fe166cffc9ebe3645f82659bda5eb6
-
SSDEEP
1536:KOldlc82OnFAF1NiGnGjvh9cNRslU0sgETl:KvNOnFAFRnswRsmJg+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53763c7f10cad6a9583560dd2ddb1090_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1952 53763c7f10cad6a9583560dd2ddb1090_JaffaCakes118.exe 1952 53763c7f10cad6a9583560dd2ddb1090_JaffaCakes118.exe