Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
d077ba0f59b7cadaaa4abab444ea86d3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d077ba0f59b7cadaaa4abab444ea86d3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d077ba0f59b7cadaaa4abab444ea86d3_JaffaCakes118.exe
-
Size
308KB
-
MD5
d077ba0f59b7cadaaa4abab444ea86d3
-
SHA1
18ffdd3bb887220c37883dd7bfe704748d7a467c
-
SHA256
a7ca3846c6bedaf76c8fc67046b1a11f7d9fed8626832393f9698b0bc353a591
-
SHA512
df2744c4e7799ffb9dca6a8425611f451ac6df2af75b068728417f901b76f28923fabec007eea651976264e8d62d96e35f5d52105243e3b78786aa3b3bbd7217
-
SSDEEP
6144:hHoizPs/xm/QH+3U4GiLE2EydqKs2tR8OnIR1tyYuswfxTt:uiz2He3U4t7Xq/2trctyzsWxTt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d077ba0f59b7cadaaa4abab444ea86d3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3244 d077ba0f59b7cadaaa4abab444ea86d3_JaffaCakes118.exe