Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 10:32

General

  • Target

    6f378101a70b6e65849832a7afb423d9_JaffaCakes118.exe

  • Size

    5KB

  • MD5

    6f378101a70b6e65849832a7afb423d9

  • SHA1

    cf088e6348397f376c3946c921c4956da0f5d4a5

  • SHA256

    e35f8fdc504f971dc18b3edac62425fb38ed1afad4b2d0ddc500f4ca06dff445

  • SHA512

    46b6f012272f97d5bfbd5b3818f655a89421272d28e42861ba76b9b61ec595ecbdaeee46e69ede44371b0f5f0cf01a03e6cbb5c5b1d39b14ff2121418eca5b2a

  • SSDEEP

    48:yOlxO473rPDkyQMipiui4gj/SeJY8JTapLWFPKR8xMw3wvXoB:/lxOabwUXFFPKRbX4

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f378101a70b6e65849832a7afb423d9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6f378101a70b6e65849832a7afb423d9_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/760-0-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/760-3-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB