Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 15:08

General

  • Target

    b81c3662740329479cad10d52648e3ff_JaffaCakes118.exe

  • Size

    933KB

  • MD5

    b81c3662740329479cad10d52648e3ff

  • SHA1

    f17f8d8514bf47feef20d77e994824a68aef3381

  • SHA256

    487eae89e93c17dec6efbf474fd1bd73c0720c9e80a6065c28d0fedb4249d361

  • SHA512

    46a5491e03c7dd798cd330ade10cdf348f1bec9bb01b29f213fabe36448199599df608349df7a73f36c3146f843abcf0bb7ceaf5a11f49bf03170db426e24396

  • SSDEEP

    12288:YS9vxqkTZFWsh0OAPRIzIWR2EUY+2UW3qlJ9uQGg/uOjWFOKG2aS3yHI:YeRFFWNOeIzIWRsOkdVZ75HI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b81c3662740329479cad10d52648e3ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b81c3662740329479cad10d52648e3ff_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:876

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/876-0-0x0000000000400000-0x00000000005EA000-memory.dmp

          Filesize

          1.9MB

        • memory/876-1-0x0000000000400000-0x00000000005EA000-memory.dmp

          Filesize

          1.9MB