Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 02:00

General

  • Target

    b1b6ecd54ad96b1ca09d3bb068307809_JaffaCakes118.exe

  • Size

    631KB

  • MD5

    b1b6ecd54ad96b1ca09d3bb068307809

  • SHA1

    4d843777dae77e3d4c12b5c8f74a699cc8e8c3a7

  • SHA256

    2b22b8d711bac8e92f3758770d3c2c17acd7970f9eef3246d214f6a9e748202b

  • SHA512

    a6b7cfe27ff00b9d9a1632e4b755e80d77e238c698a391cea8625711538f7b0f2b56215452bb0da2e4bb099826257140f5fc1724483bd48dfc00689034c90207

  • SSDEEP

    12288:qNoFmw6FvnRuzg/axX7JY+eSUSuuFi4A547+8pVpDckHxYfpQ0:qNlw8vnRuzg/axLJY+cSJFi4ACy8pVpu

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1b6ecd54ad96b1ca09d3bb068307809_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b1b6ecd54ad96b1ca09d3bb068307809_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads