Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 22:35

General

  • Target

    b11cf28e863f8fef6c88903bb4c08540_JaffaCakes118.exe

  • Size

    643KB

  • MD5

    b11cf28e863f8fef6c88903bb4c08540

  • SHA1

    d6136f53f8084e2c28acc7e9120865d3ca1f72b6

  • SHA256

    fa97e4fce4230873c86c85a8d1928b010ecd814a4350f9b296e21da32a31951d

  • SHA512

    14a63bb1dff17fe804c178dea90ef8cd47795dc012857f077a5b9b2f6f549dc48a6f9cae035e3fc83dd48223818e84bdf795b950703dda906e9012880ced0aa6

  • SSDEEP

    12288:9r/ppkkACNSNy5FUpHrhkBdOyUrAyWx0f89JJY:9jnANy5IHNgisx0fA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b11cf28e863f8fef6c88903bb4c08540_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b11cf28e863f8fef6c88903bb4c08540_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4792-0-0x0000000002270000-0x0000000002271000-memory.dmp

    Filesize

    4KB

  • memory/4792-10-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/4792-11-0x0000000002270000-0x0000000002271000-memory.dmp

    Filesize

    4KB