Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:13
Static task
static1
Behavioral task
behavioral1
Sample
826baae74455e8e1650c1deb4eb2f79b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
826baae74455e8e1650c1deb4eb2f79b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
826baae74455e8e1650c1deb4eb2f79b_JaffaCakes118.exe
-
Size
100KB
-
MD5
826baae74455e8e1650c1deb4eb2f79b
-
SHA1
fd762cc313d4cecc8a9cd608cb79653500fe32e3
-
SHA256
fa0b97e611f3c6b6c460019f8b7d9c68a478445f64cf5602dc74f9990f3879fd
-
SHA512
3af5e2a84c4c90ef61ccb1f2c3f72150ac0161a988f7a27a15690cbe853d843a08feebdbf8d02ed3a3b9bb5099d8e0f9bfb5ff971d2eea89f6751daf72368dcf
-
SSDEEP
3072:GLNfBCoBVJ0Pcb78FnD3niOCkNPBXnK+nlYeEA:MCo/Wc785DXywB3BT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 826baae74455e8e1650c1deb4eb2f79b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2260 826baae74455e8e1650c1deb4eb2f79b_JaffaCakes118.exe