Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2024, 22:07

General

  • Target

    81e9f911d258a3c80ecbc05939f0dfb6_JaffaCakes118.exe

  • Size

    482KB

  • MD5

    81e9f911d258a3c80ecbc05939f0dfb6

  • SHA1

    a98736e051f53fca9409e47aa21703ffa15b5340

  • SHA256

    bd6530dfe7f855a5e8665ed0278de61d2e47b51f3d4cd90ec516bfedc383f0c2

  • SHA512

    51a748ecebcf414f00bca75b00ff59b3bffd57c6f2625c6644d8c8856149dee8da10dce7b43d1ca4951edafb680b9b920735385a98754f2ee0d3b158ae5ab3e1

  • SSDEEP

    6144:Gt6g5H3S5zL8t+IlY2GZ9qqL032nSCrhrjh24TfUWpdY8zEFRLp+wUCGdubHcQuk:GtztfGqqL0CBhsvrUBdqW4xD

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81e9f911d258a3c80ecbc05939f0dfb6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\81e9f911d258a3c80ecbc05939f0dfb6_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of UnmapMainImage
    PID:2972

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2972-2-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2972-1-0x0000000000401000-0x0000000000402000-memory.dmp

          Filesize

          4KB

        • memory/2972-0-0x0000000000400000-0x000000000047A000-memory.dmp

          Filesize

          488KB

        • memory/2972-3-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/2972-27400-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/2972-27402-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB