Analysis

  • max time kernel
    142s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 12:17

General

  • Target

    6f89e7cffbc4be03e810898dee06e281_JaffaCakes118.exe

  • Size

    58KB

  • MD5

    6f89e7cffbc4be03e810898dee06e281

  • SHA1

    c080c9b806d037e5f327172b4e70b8a7927bf05c

  • SHA256

    b1d7ecff03d974cd0932f366a3907c1cac4933d4a9cae8a67aac6afa9ba607b0

  • SHA512

    3130cfb2d099d97c79dd4deebe5b65856c7d590829568b6a8a1f3b0314e0dc656049f00c97546bbafcaad52bb7d0490c350fd530b4e6c896d8f155518e1efc29

  • SSDEEP

    768:9evFI1m0on6HGavZUPQffoaFNnioNQpMGZXlFPVrqX9zm3yr53nm5GMuMQC3aTZ:YtV6HGavzgamfRK9zm30dnvfM1a9

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f89e7cffbc4be03e810898dee06e281_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6f89e7cffbc4be03e810898dee06e281_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2052-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2052-15-0x0000000007710000-0x0000000007925000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-18-0x0000000007D70000-0x0000000007F85000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-17-0x0000000007B50000-0x0000000007D65000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-16-0x0000000007930000-0x0000000007B45000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-14-0x00000000074F0000-0x0000000007705000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-13-0x00000000072D0000-0x00000000074E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-12-0x00000000070B0000-0x00000000072C5000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-11-0x0000000006E90000-0x00000000070A5000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-10-0x0000000006C70000-0x0000000006E85000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-9-0x0000000006A50000-0x0000000006C65000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-7-0x0000000006610000-0x0000000006825000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-6-0x00000000063F0000-0x0000000006605000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-5-0x00000000061D0000-0x00000000063E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-4-0x0000000005FB0000-0x00000000061C5000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-3-0x0000000005D90000-0x0000000005FA5000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-1-0x0000000003FD0000-0x00000000041E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-8-0x0000000006830000-0x0000000006A45000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-2-0x0000000005B70000-0x0000000005D85000-memory.dmp

    Filesize

    2.1MB

  • memory/2052-38-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB