Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 11:44

General

  • Target

    b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe

  • Size

    32KB

  • MD5

    b354446f27096f68eb5e8fdfc628419e

  • SHA1

    0775bf7f987fae85c9ec08c2872f931705828e1a

  • SHA256

    57b8695d861d70b700b75f9e1a68069172051fa90b1e6cad6fb00eaee5b26222

  • SHA512

    8d7af4d3cddd5f43a77dba045a3e3661353f455c0dfd506528e3a077ff2e1b5a2891754e982a27fca0af6ad9bbc46a786c857eb262938d08b9d1d1391c60d00c

  • SSDEEP

    384:4YgAUDjUL9fvGt7Ma+lhsSJAmu1KymGa:4topgv+lhsShoKB

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\SysWOW64\net.exe
      net start mtsodfdss
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 start mtsodfdss
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads