Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 22:20

General

  • Target

    b110d6a5cd22aae8212f9c5797ee6469_JaffaCakes118.exe

  • Size

    614KB

  • MD5

    b110d6a5cd22aae8212f9c5797ee6469

  • SHA1

    f29e299b104b74293ff26c5e0c277d27ec9795a8

  • SHA256

    ced0a793da5c31595b8315344b59efb12fc8204020d36549acd97549df8353ab

  • SHA512

    c4b71114dd54932ac7d9d22739df5398b3ea668935ad4d0b1c684fb5477e02fe7b77c0f029f25df6247433f473ee6dd58b339c4a2976dae689875b00b7fa3949

  • SSDEEP

    12288:tR4oE1h2NdJ8xKk9++u7JY1C1HoO7eHibV3O9BC28N3hecH3p3/:tRXE1kNdJ8xKk9++gJY1At7eHibhkBCX

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b110d6a5cd22aae8212f9c5797ee6469_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b110d6a5cd22aae8212f9c5797ee6469_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\i_temp.temp

    Filesize

    41KB

    MD5

    c6f36e7b7402749ad7d08d81f6212905

    SHA1

    246c3ca48d448ea782cd00a2e5339605b694860f

    SHA256

    c787893052396c6c24db24bd9e5cf588f045eb0dbac23bda9f214b8b59230cc6

    SHA512

    5d0bfd9742037aa701b45d10fac587774c194dc8b2d3d10a27172e1632b2e8857ebd581b7dbffeaddecc9bd2286cbbd4da1a73069b8e1f483bbd38297761bed1