Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 17:52

General

  • Target

    a389bbc4a227e669fed3a6253795a2fa_JaffaCakes118.exe

  • Size

    657KB

  • MD5

    a389bbc4a227e669fed3a6253795a2fa

  • SHA1

    97573eba985c3194e4417ab459f9e95ca03e6664

  • SHA256

    271b935db3491db2961b83e3d62cd80b934fabb0c30418622c75bf194cdce9e1

  • SHA512

    a296496518164f90ab16fb2465d9872b2e3f5ec5d2e57e67f5d108e932443ed8454210413555468da98c2b6c2ebaeb56e6ab5324da23624deacc198947c608d7

  • SSDEEP

    12288:HrLmm/T2o+uD0h5dAgou7JY9tO/lA3zvPsvq1Xpvc85BnTsxslM/eFpUP:HrLmATIuwh5dAgogJY9tO/U8q1X9nIxf

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a389bbc4a227e669fed3a6253795a2fa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a389bbc4a227e669fed3a6253795a2fa_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads