Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 12:20

General

  • Target

    70af2983bcbf55075494be570f5f9fd3_JaffaCakes118.exe

  • Size

    596KB

  • MD5

    70af2983bcbf55075494be570f5f9fd3

  • SHA1

    04a4935488458d59b5909452d937f1d92cb6e3d9

  • SHA256

    47b0660a6fe272de6ae38c70a31e534870ceec515e9cb2ba58eccf5d59fc0a03

  • SHA512

    39ef582d64110a7928d0eb1f79a1bf7f6766cb192f6aa1680d58bf4c441e5ad0ac08261bbad72a2ba025aa08d36dcb78247a9c34178ff20037f4964485c9980b

  • SSDEEP

    12288:sZUW3LqSwTJFlwGLZTTlCpKoNxEAXBa7kfhP:ksSGJGfrXBa7kfhP

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70af2983bcbf55075494be570f5f9fd3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\70af2983bcbf55075494be570f5f9fd3_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Language\English.lng

    Filesize

    26KB

    MD5

    c77d18d08407a0efd36292a53f617e57

    SHA1

    6699d6d9ddd8b7f7079e4260affee7cf129783a7

    SHA256

    0274c395dd8a955700c19cbadf1e199c10bead4e53be88027f9d68b972972fd8

    SHA512

    02a4db450e861f9f9aab19be21d11b1a16675f7ec029b054828ec2e872162b9628f454f268f964b77444dd734d6e0591e6052d9105e09c2f14a1aa701282b351

  • C:\Users\Admin\Documents\Abrosoft FantaMorph\FantaMorph.ini

    Filesize

    832B

    MD5

    5d0672003fc050502b66d1ede1e1850b

    SHA1

    f434c47a496a37e492a04c971eba8da7e9a4216d

    SHA256

    f3d55e68d8c3ba749b31aef4c295da71b40d88ca80c042d4bae19d088b5f2543

    SHA512

    b3981efd05dd7ba8c19ba8154fbcda17e8d17ff7a9a3353d25776471b4ff8b441ffb3517f4d20577c63eea889d8899773a93ffbeca120bb4574c374a0caad8a8

  • C:\Users\Admin\Documents\Abrosoft FantaMorph\FantaMorph.ini

    Filesize

    804B

    MD5

    299762406aa97219179c2f5910a770cc

    SHA1

    ae02a9ac93d84263c4036fa4a6c10760eab9ecbd

    SHA256

    bba6a56b36ad5f6d9357cb4906424043844e61e7b2ebf3cd7f846d4c41ceb22a

    SHA512

    c25fd755ce5d3a69fba78ed9417b83fba70c7cc31070239e622d32806f9b9084ef7514eab6373e34363594abc0029e38c993001891a62e68f04ac94934a681f8

  • memory/3696-0-0x0000000000400000-0x0000000000693000-memory.dmp

    Filesize

    2.6MB

  • memory/3696-208-0x0000000000400000-0x0000000000693000-memory.dmp

    Filesize

    2.6MB