Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 14:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ef27bbbcf3bdc38ea6f7b779c090828e_JaffaCakes118.exe
Resource
win7-20241023-en
windows7-x64
2 signatures
150 seconds
General
-
Target
ef27bbbcf3bdc38ea6f7b779c090828e_JaffaCakes118.exe
-
Size
332KB
-
MD5
ef27bbbcf3bdc38ea6f7b779c090828e
-
SHA1
0d1593dfb05e4289485236c54542e48b87c11709
-
SHA256
9d128272a7bdcbd428c61b81d41a49fcab1cf8a59f82a00d252f24768216bf0c
-
SHA512
fb65da4658feb2a3ac8c9e201eee263f26987df4a8be6ca1496b592848b551dea9bf060488c036314c7109863fcab20e8b16e269f07abe02635f741e7ac0ea86
-
SSDEEP
6144:xYVZKdLTfAwPesRK7xenRfqtoPvzzrwGCeRMfz6xOX6h/R+2S69wvQ6Obw:UZmTffPMcRytucKRKz6y6hJSTQt
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef27bbbcf3bdc38ea6f7b779c090828e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2316 ef27bbbcf3bdc38ea6f7b779c090828e_JaffaCakes118.exe