Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 08:05

General

  • Target

    6adbab1d50d038764d281dc073af6f79_JaffaCakes118.exe

  • Size

    358KB

  • MD5

    6adbab1d50d038764d281dc073af6f79

  • SHA1

    d3104d804adbdcf16e22bbf9ea46cc92f0f53e39

  • SHA256

    30040bf4a84d62d921a6501e8bb7964fa2969aeebe4cc6fc414a2eb4ca66d363

  • SHA512

    4a8e2dec93d41e80b24ff0c5374a3eaf0c1bc600ba021e432cded90d2f875c50d55ac78fadd95fdb9a5ca06d741a3cc76853f1e5fa35ad0f486f2e7b8f9823b2

  • SSDEEP

    6144:ol8KWs/bWq+nR6xtEstSlckJ4OUSccLU4968TI+RjoScy:ol837cCHJrccvZPRjoScy

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6adbab1d50d038764d281dc073af6f79_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6adbab1d50d038764d281dc073af6f79_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\6adbab1d50d038764d281dc073af6f79_JaffaCakes118.data

    Filesize

    1KB

    MD5

    02c118ed38f65cf605bf407204d887cf

    SHA1

    32c848f4bc5ab8c2c558e28a8c35abc80df7b30c

    SHA256

    97e982972275ebc2b82a0763c4a91eeaa7f86334939de3fa27d461eb5f472945

    SHA512

    9bb9a12429b0221e06940a46f24d2048d786ac00f8b039dd163f5c5b78adb36ec77f7480179fa0ef25cf4026c1f4d558c1ab6490913db416b5b364f21f1a62b3

  • memory/2628-0-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/2628-11-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB