Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 12:46

General

  • Target

    741d8b5c22e0984550f37cada7d52cc6_JaffaCakes118.exe

  • Size

    32KB

  • MD5

    741d8b5c22e0984550f37cada7d52cc6

  • SHA1

    f0ea49ed0da4126a10a85308cb67158a1152ff16

  • SHA256

    26b1dda8ad853d95cd37cef4258fb7af4ade88d0479935c0512eab199fd902dc

  • SHA512

    23303f40d1e507c3dd5b569f178e04ce6c5328f2eab8d6558ce49ed15184c76ba5481dc474963a6aa36fa472ef4d95756b3fca8dfdc74350bded886dd04c6952

  • SSDEEP

    384:EPyQE1MVJnMRNusKBs9F9rcUySJouitCtTQS4Pn9M7E67TLm+DGSEP4ka:E6QxVJINdn9rrckXr4PE/B/k

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\741d8b5c22e0984550f37cada7d52cc6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\741d8b5c22e0984550f37cada7d52cc6_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3020

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads