Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
56cc3542bd9a1c9de8ee3069570c4b56_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
56cc3542bd9a1c9de8ee3069570c4b56_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
56cc3542bd9a1c9de8ee3069570c4b56_JaffaCakes118.exe
-
Size
20KB
-
MD5
56cc3542bd9a1c9de8ee3069570c4b56
-
SHA1
37bef27a21aa2a1a2d33a1f1b9336ed3d384103f
-
SHA256
7ab4a10bebbb73acd2f3cb6f9a5bcee7e4f0c6db6563df99f2de36af9a96b69d
-
SHA512
f6caac2ba858f0b30787f110376c869cbd8702b0a8724a2e193d82d92282a5c59bd09a3c99424ff27cc78ec6ac24ece83f1fb8830360ed465d529016efd17adb
-
SSDEEP
96:/lx2WKyqmlxn4g3549LdBq7DsbWeLWYEeqm:/Toyq2nlG5IDs5WDeq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56cc3542bd9a1c9de8ee3069570c4b56_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2024 56cc3542bd9a1c9de8ee3069570c4b56_JaffaCakes118.exe