Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2024 22:27

General

  • Target

    acd488f2983792a3e73c9567ffc5ca45_JaffaCakes118.exe

  • Size

    1005KB

  • MD5

    acd488f2983792a3e73c9567ffc5ca45

  • SHA1

    a2aae449cd3b20eb5106240460626e3a3b01bc8c

  • SHA256

    5a1d5122cfd1dd4aa5b93a484a9107cec402e6d2fb3a676c972a1f02aaca37cd

  • SHA512

    82d8c1925a34607b8fd173ac241a49ffb634e45cc22232134427e62077d7752e8afec0b437e75dcb6c6eb9f54be08fa9a954562a0d73b5454f75be623851aa5d

  • SSDEEP

    24576:sq9uAyO0P7lAKTdnc6iflf9va8LQA7wrGLVgeY9L6dfIn+P2e8:T9uAdIeUc68lflagQA7wuVge+CfIn++/

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acd488f2983792a3e73c9567ffc5ca45_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\acd488f2983792a3e73c9567ffc5ca45_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4964-0-0x0000000000400000-0x0000000000692000-memory.dmp

    Filesize

    2.6MB

  • memory/4964-1-0x0000000000870000-0x0000000000871000-memory.dmp

    Filesize

    4KB

  • memory/4964-2-0x0000000000400000-0x0000000000692000-memory.dmp

    Filesize

    2.6MB

  • memory/4964-4-0x0000000000870000-0x0000000000871000-memory.dmp

    Filesize

    4KB