Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 03:01

General

  • Target

    b1e0277539cbf4e2731e3d26c3e1a939_JaffaCakes118.exe

  • Size

    646KB

  • MD5

    b1e0277539cbf4e2731e3d26c3e1a939

  • SHA1

    94c233d260e8891beaae5302f0ea82881c715206

  • SHA256

    69ece7b633c8d553c18fad3f14ed8e0461c1f51928c61715f166d74e604fbabd

  • SHA512

    3f2916a60a9d0cd65460404eda8e8139bdbe3aa781124b3696be4366821de08fff8cb89a4d2f159ec3c8c5dba7801df8d4250b0b018f7a122c71758a3f516316

  • SSDEEP

    12288:lXdh2Tl6shTzy1lbC7JY0IM6ax80s8kx4IEqsDSeUESn0pfb:lXf2h6sJzy1lb8JY0iaS0s8k6zqsDSe7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1e0277539cbf4e2731e3d26c3e1a939_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b1e0277539cbf4e2731e3d26c3e1a939_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads