Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-02-2025 03:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_0977531ef0b57b6683e87a68d4f6ee11.exe
Resource
win7-20240729-en
2 signatures
150 seconds
General
-
Target
JaffaCakes118_0977531ef0b57b6683e87a68d4f6ee11.exe
-
Size
380KB
-
MD5
0977531ef0b57b6683e87a68d4f6ee11
-
SHA1
f9a9a712043f9cd19bfe2663b64250a8dd47b690
-
SHA256
b1d0bd6707677238de9abaeff0b0c432f8e6f3bfbcb79f6d89d7bfed0bf665c7
-
SHA512
5c20c4e8dd5c7ca2591f2f76e54a077dfc1a79996ba624c7c0c9333dad72a0fcc88ef80d9e350298a3e18baf2f19234d09c7b89e91a776585124ee793431c896
-
SSDEEP
6144:s/lWiaAL7T4dhSv6gCYXCz/L/Xzc/Tv4ON4ZiOxdIbf7ntCHeC:3A7UhwfCAWTXzccXd6u
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0977531ef0b57b6683e87a68d4f6ee11.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2772 JaffaCakes118_0977531ef0b57b6683e87a68d4f6ee11.exe