Analysis

  • max time kernel
    144s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 08:32

General

  • Target

    89b0eb00b7c664157bbfe6d6d1a45f6e_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    89b0eb00b7c664157bbfe6d6d1a45f6e

  • SHA1

    7f44f2640c82df494b91a82b888ab56d2a250433

  • SHA256

    d9ef5a0c2ab44b864eaa9db0ab37000a33981bdcf604d5127897247f21f5686f

  • SHA512

    bd4e2c856275b7f33bdea8bb4bd9d648da230bef07f39ea9ebcfa3a43c4ac3560795f6de6b79949616682f1c3cd8e566cfe38949de939cbdf6ac06351d333b16

  • SSDEEP

    1536:quqXuX1AzbJP4oREc4yoovA553awNetBOb5U+EDz+L52Rr6Tt:qlXuCbJP4vyooI55qwotoNU+EY5lTt

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89b0eb00b7c664157bbfe6d6d1a45f6e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\89b0eb00b7c664157bbfe6d6d1a45f6e_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Çö±Ý ¶óÀ̺ê BACCARAT.url

    Filesize

    125B

    MD5

    7042cb785117b14f47fb3475e93d2fb5

    SHA1

    112ed00479cba6a69c9a4446650319f51e16dfc9

    SHA256

    879231472525a6a638677918c35bd26cb13fe08f8d960dcce4009c935027f02e

    SHA512

    3e358373a124ca79acb814e4c4a7b13f10b46bacfcf0d0fd98d0b4954af5491cb449e6cbbab791e1a923a8d4b1f9156264867fcc2ed78f2db0d6bcabad25b6d1

  • memory/3372-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/3372-13-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB