Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
d034cfb1a4b9c2974f8bfce12db789d0_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d034cfb1a4b9c2974f8bfce12db789d0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d034cfb1a4b9c2974f8bfce12db789d0_JaffaCakes118.exe
-
Size
292KB
-
MD5
d034cfb1a4b9c2974f8bfce12db789d0
-
SHA1
ed82612b79adb387eb1d37a16016a7104dde91ca
-
SHA256
0abc5d9c2790c3155e5cad1b0df107b18dd98b4ac4545f82dd0f8183a82bf426
-
SHA512
a92c04d5092dc68826e17c0b351f37e51e84468eb09c88ca8747e8838abf5e5446e5e826be3d0036252ba207e6dc2066bc8fbf24038275d04a4dc7d22f16e48f
-
SSDEEP
6144:I0ascOICYCTGwiApsa63wAnrrr9vz93aLihUm0/H:CATGwg3w2rrr9vz9KLQUm0/H
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d034cfb1a4b9c2974f8bfce12db789d0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2076 d034cfb1a4b9c2974f8bfce12db789d0_JaffaCakes118.exe