Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 22:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1d65d61cce46a136cdb4bd44d1100e8b39ea18003c0e108d3f046de588415df6.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1d65d61cce46a136cdb4bd44d1100e8b39ea18003c0e108d3f046de588415df6.exe
-
Size
336KB
-
MD5
65840d7f4fcbfadc8445d73746f3fe68
-
SHA1
500124caf95462c0371be441b0ca714fb5cc0163
-
SHA256
1d65d61cce46a136cdb4bd44d1100e8b39ea18003c0e108d3f046de588415df6
-
SHA512
5998e7568e1210cae3262960de1d55dad63d733f4655249cb76a5e0c51dc25311ba1332b99452b422bd77761b294e26b4a8611c682767a95543055e272f17219
-
SSDEEP
6144:Sr7hkhreL5b+ZTTTBx+Dqn9iin9dgn9BvirtToOGtT4Px47:SnhL8TTTBx+Dqn9iin9dgn9BvitGe5w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1d65d61cce46a136cdb4bd44d1100e8b39ea18003c0e108d3f046de588415df6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2168 JaffaCakes118_1d65d61cce46a136cdb4bd44d1100e8b39ea18003c0e108d3f046de588415df6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d65d61cce46a136cdb4bd44d1100e8b39ea18003c0e108d3f046de588415df6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d65d61cce46a136cdb4bd44d1100e8b39ea18003c0e108d3f046de588415df6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2168