Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 07:18

General

  • Target

    bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe

  • Size

    32KB

  • MD5

    bace57f91512f1f99a84473dd39c8b92

  • SHA1

    5362a0fab6bae2eccdb201ab11f5b5a7eecf15ed

  • SHA256

    eed93e27c90c3e0b9e3bc3f9d60f0e73bbb78d5498ed3bdbf4b6e987465f7bb4

  • SHA512

    a4edc24e941b2ee403987a49fc5433d495726025358778a17cf0a40e9d2d4185dbdef633e3851a7a9580041c8d4ecbc229ae92c2937f2621df3a26081caab976

  • SSDEEP

    384:wLMEC46m2dcbuGQh0A5Ztq54wt1VOZBqP6m2dcbuGQh0ABe:wLOBCbQh0A5ZtqfUZQSBCbQh0AI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bace57f91512f1f99a84473dd39c8b92_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\TM.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\TM.bat

    Filesize

    222B

    MD5

    19636aed76ca2f4ac5395da32ab225c3

    SHA1

    c2385505f628bd42bb40d15c0d5bf3cc691b3c44

    SHA256

    5d415130fd1a7cfd34af7970d8046c7fbfe71c26d957da7fd32142c64f95b004

    SHA512

    4115117af7605a4528be6eca3593cf797a37cd53f6ccd426cac6e1f530f8520fb10eb8f7b314093daa2e19e7b7f79180efcfb264284e23091e0482dd0f790927

  • C:\Users\Admin\AppData\Local\TMPexe.exe

    Filesize

    8.8MB

    MD5

    b5c198d55c7bbaad41e41d8bbcea20ab

    SHA1

    2789b866df6a9fc34b3dc29ae09066dc21d51844

    SHA256

    620b65a5fddb062dc45a6be7cc0af8a2873dd215b4a8a63a8ca347c6727bdcad

    SHA512

    9ab269c1b531c25f3b9a4128b1b09e25d18a02709c5c6d14a1322dbf95051f7f8bf5074d6e9979e0967ae27387188d602bc605ff36a984460f2ad813a3af737e