Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 14:02

General

  • Target

    6fe07b97306d182ed84f9876bba1c79a_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    6fe07b97306d182ed84f9876bba1c79a

  • SHA1

    4f66aa526cc210f6e9ccc9f2c8ae43a58bdf9f8b

  • SHA256

    f9a41dc21eb81bb48b2ec252e862250663eb0d684d6f55e74308f912ff39ffe5

  • SHA512

    b3d895e7766b7a264fddcc2db9848a0fd4744f92b57f131e35d552f70e46d22ff11b067cbaee798f58e2d3102f727224f47513e815b267ac73f64681202f565c

  • SSDEEP

    768:MdMRZ8+bCWuIHN0uRpXB+c3tKRRZ2CoCAod4edWgP9uxlO+:Md4+oN1B+xzvoto+NZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fe07b97306d182ed84f9876bba1c79a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6fe07b97306d182ed84f9876bba1c79a_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1772-0-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1772-3-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB