Analysis

  • max time kernel
    141s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 10:19

General

  • Target

    b742535f77184981566a012354a3115c_JaffaCakes118.exe

  • Size

    800KB

  • MD5

    b742535f77184981566a012354a3115c

  • SHA1

    cdc7ede75c261536542b26b6e24ab702a34815a2

  • SHA256

    93a473e8603d4679982a3c282f0937b4a150c248f9d2285ad2a31a251802fad7

  • SHA512

    eb842c69e1259b0b6702e6072958c09a1642162d4a8c1a0d0ab8a241617e53f562ea024f4255bca3733c3340dd74992f6b2f3e2d0275de99620b994edf7eaaa3

  • SSDEEP

    12288:82YpyjIMF2B69dS6u96x+Be+iySnHW6aqMSe1EQguhpfqlOfv:z8q869dS6ued+sVwSe1EQgGpf9

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b742535f77184981566a012354a3115c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b742535f77184981566a012354a3115c_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2348-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2348-2-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2348-1-0x0000000000400000-0x00000000004CE000-memory.dmp

    Filesize

    824KB