Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 12:25

General

  • Target

    6f8ff0029b435982ea91461db4b72081_JaffaCakes118.exe

  • Size

    1020KB

  • MD5

    6f8ff0029b435982ea91461db4b72081

  • SHA1

    e1cd3b1b485d2d4e37528e24091a67621690b90b

  • SHA256

    fe5852a0c97c2d5a4ddd761c2dc98fca88ca57ea2d0c639226a90e3c75bdcc1b

  • SHA512

    e79309bdbac1b572b6795c5e7a59ca5c88933d9569165f74cdf04bef187c7284dd9c1d738e2284ee29cbf4ce5815298ccae1f1542fb9cc42729dff86c3475b43

  • SSDEEP

    24576:3rj5I+YHZ6ElGEBMOzwKY1Qwd0eQb6jZeu56o:3WH8QBM9/WG9tp

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f8ff0029b435982ea91461db4b72081_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6f8ff0029b435982ea91461db4b72081_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\osxp.ini

    Filesize

    7KB

    MD5

    c5ed2b71435e03a110ad5ee0238a536d

    SHA1

    8074871ce04df025a24f0c0c07ebd8cec7d0b925

    SHA256

    468a0fc6aec668f7dc1089f7462949da4f8cfeddd8c8f04058d6d16f2036ee79

    SHA512

    3ac775a7ae7ea1fe3ad83bcf5b141f1af290b78c8e5e66ec66c5f8ae6239ad522fb32970b0338d0c849db2f8c11e0061c151c4079de45d373b686f75fe1f535f

  • memory/1712-37-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1712-0-0x0000000000400000-0x00000000004FF000-memory.dmp

    Filesize

    1020KB

  • memory/1712-397-0x0000000000400000-0x00000000004FF000-memory.dmp

    Filesize

    1020KB

  • memory/1712-399-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB