Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 10:24

General

  • Target

    73a75d31ff4e371545a234c2673e9a66_JaffaCakes118.exe

  • Size

    621KB

  • MD5

    73a75d31ff4e371545a234c2673e9a66

  • SHA1

    33a93271ba324a825885df155954f9ee0feb66ed

  • SHA256

    aef028b693d002ecd4daf925b595a79e63a4ca77f85c4588bcc53702e6a9f438

  • SHA512

    738a194f9d7936804775da113b8b4d698fd57e6a43cc7f9b8bf90233a736ef3ae0afa62b157614a08a8069c4b250e50ef2b4e329fcc04f3296e7db8998a3bbe6

  • SSDEEP

    12288:rzfjfq8dIZP2kHKfzNNpq7JYVl4dDivhdOpVbXzMO9b8jlTyc2ERSgdiJbAhAmOw:rzjq2EP2kHKfzNNp0JYVoDivhdIXzMOo

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73a75d31ff4e371545a234c2673e9a66_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\73a75d31ff4e371545a234c2673e9a66_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\i_temp.temp

    Filesize

    41KB

    MD5

    0d695efe08700a3730462e64f813994e

    SHA1

    d466665a87cc1c7c5c8ea99cd5e2e3ca79334174

    SHA256

    829b41be330bf8949b4b7b5cf5ab0ab628b017069ba54dfe0bdb6f02a21bd129

    SHA512

    73cd664cb278347d393061ead9bacea0743930146e8c16b2af28d2086f8d19272ebf5a3bf43d1662cb56612d01c9fc9482cd5ea69f863af7192331308b13b642