Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/12/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_eea0693fcd14bfed50e429eb8bb8ddee10536255a43d41538d7e7f0af7f48891.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_eea0693fcd14bfed50e429eb8bb8ddee10536255a43d41538d7e7f0af7f48891.exe
-
Size
336KB
-
MD5
02afb840e9aae8c1788f58cd7e06e84f
-
SHA1
71bd1e4028175056207ac0028669225e62394be3
-
SHA256
eea0693fcd14bfed50e429eb8bb8ddee10536255a43d41538d7e7f0af7f48891
-
SHA512
e8f6b2814efbae5357dee3fffe6148d4d3005f85473a9e1936fee96cd0b84a024b069b44268e108bcef680ca1e6643baf2656f19f8b3dbf9ce699e122ae9d629
-
SSDEEP
6144:Sr7hkhUeL5b+ZTTTBx+Dqn9iin9dgn9BvirtToOGtT4Px47:SnwL8TTTBx+Dqn9iin9dgn9BvitGe5w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_eea0693fcd14bfed50e429eb8bb8ddee10536255a43d41538d7e7f0af7f48891.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2944 JaffaCakes118_eea0693fcd14bfed50e429eb8bb8ddee10536255a43d41538d7e7f0af7f48891.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eea0693fcd14bfed50e429eb8bb8ddee10536255a43d41538d7e7f0af7f48891.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eea0693fcd14bfed50e429eb8bb8ddee10536255a43d41538d7e7f0af7f48891.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2944