Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 02:28

General

  • Target

    a0df856a774e59444b035891817e3f88_JaffaCakes118.exe

  • Size

    53KB

  • MD5

    a0df856a774e59444b035891817e3f88

  • SHA1

    d89a5cb44387788a4878d7d0ed04b7d1bd171966

  • SHA256

    246475f38a27965420edcaed36f3284852e69821f7fdd03e9afa26d8f3bcf5c8

  • SHA512

    84db3772daa65fc524d54797382381898c37e269730f58fc1c5711771669dc19757a2f7c2383cefde0712ca0a08d870cc362096a0d6211cb6a1802034e4e10b8

  • SSDEEP

    1536:fOBdTosM2E59dmMHJbjTlNF/oJeFrtQXMIk+mHTJjl:fOBKq03mMH53OeRtQ8bftjl

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0df856a774e59444b035891817e3f88_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a0df856a774e59444b035891817e3f88_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1052-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1052-1-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1052-2-0x0000000000590000-0x0000000000591000-memory.dmp

    Filesize

    4KB

  • memory/1052-5-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB