Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 22:35

General

  • Target

    b11cf28e863f8fef6c88903bb4c08540_JaffaCakes118.exe

  • Size

    643KB

  • MD5

    b11cf28e863f8fef6c88903bb4c08540

  • SHA1

    d6136f53f8084e2c28acc7e9120865d3ca1f72b6

  • SHA256

    fa97e4fce4230873c86c85a8d1928b010ecd814a4350f9b296e21da32a31951d

  • SHA512

    14a63bb1dff17fe804c178dea90ef8cd47795dc012857f077a5b9b2f6f549dc48a6f9cae035e3fc83dd48223818e84bdf795b950703dda906e9012880ced0aa6

  • SSDEEP

    12288:9r/ppkkACNSNy5FUpHrhkBdOyUrAyWx0f89JJY:9jnANy5IHNgisx0fA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b11cf28e863f8fef6c88903bb4c08540_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b11cf28e863f8fef6c88903bb4c08540_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2244-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2244-20-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2244-21-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2244-23-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB