Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 20:09

General

  • Target

    b0a786b989bcd30425db23a0754b8121_JaffaCakes118.exe

  • Size

    178KB

  • MD5

    b0a786b989bcd30425db23a0754b8121

  • SHA1

    b79fd4bd5d659b42e288432e010549db06d8aee0

  • SHA256

    ac3be49e9e5d57249d75bbc676f301b78429ed81db201094123654580258b793

  • SHA512

    67b29cce4eaf468bfd2a7f460d1f3e12ec24213ad5ad8618ded2c85b538dfcb7bb0b2a89c575db456fc2665764d083e425a45cfc26cd2c76d714e94909db84e8

  • SSDEEP

    3072:/9waE56hfTVl+tdTttUNpAXqQFQPLm8bfYvn4Gen13pJoPTLElwr0hjJUeDO:1HfbVitGbAXqo4bfYQFn13H6UU

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0a786b989bcd30425db23a0754b8121_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b0a786b989bcd30425db23a0754b8121_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2392-3-0x0000000001003000-0x000000000102C000-memory.dmp

    Filesize

    164KB

  • memory/2392-1-0x00000000001A0000-0x00000000001A2000-memory.dmp

    Filesize

    8KB

  • memory/2392-0-0x0000000001000000-0x000000000102E788-memory.dmp

    Filesize

    185KB

  • memory/2392-2-0x0000000000160000-0x0000000000185000-memory.dmp

    Filesize

    148KB

  • memory/2392-4-0x0000000001000000-0x000000000102E788-memory.dmp

    Filesize

    185KB

  • memory/2392-5-0x0000000001000000-0x000000000102E788-memory.dmp

    Filesize

    185KB

  • memory/2392-6-0x0000000000160000-0x0000000000185000-memory.dmp

    Filesize

    148KB

  • memory/2392-7-0x0000000001003000-0x000000000102C000-memory.dmp

    Filesize

    164KB