Analysis

  • max time kernel
    135s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2024 08:06

General

  • Target

    aa39b32586c13c315e0fb75843363e08_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    aa39b32586c13c315e0fb75843363e08

  • SHA1

    364017dd625e3cbda8cae5dee4f61e2006c10f8a

  • SHA256

    3b103a69e05e605275036aaeae1ebe9834b5e2f81a26af60ce8cd51658f6a505

  • SHA512

    80ccb64eb63d2eaed95c0d852a0e52cd7f4e272ece9298520943f96d97b69eb7a8bd4e98e31f0bdca80bd5d43d72ffcdbc6b95e35e757e71ac42ec75ef3d6d0d

  • SSDEEP

    6144:uCyC+ESIktiUO/PVYxf+2zW/uAci+eI3k5V2/BWp+TnilI8uctzJs0ZS0GLAJ7bP:uNCn++d6Wl/uAcim3e20pKcPsfW

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa39b32586c13c315e0fb75843363e08_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aa39b32586c13c315e0fb75843363e08_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4428-0-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4428-1-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4428-8-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4428-9-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB