Analysis

  • max time kernel
    16s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 21:37

General

  • Target

    c1a3a605f85a28f18b874ad0c02b3805_JaffaCakes118.exe

  • Size

    224KB

  • MD5

    c1a3a605f85a28f18b874ad0c02b3805

  • SHA1

    ac0b9c88b9485709412cb552e54da111c0cdee26

  • SHA256

    237dfc3e038979207f124d1447ec4729d18ec9db75ef42e15a89f223fa4d8fd0

  • SHA512

    e36decd4939594d9a1d5e61e9f7b903979dd0f4dbb4c319748bb9584ab52cc236fa6e99f99f671efb5d74be7ec48de54c606e07f65ccca91d8517b07e6b0b49b

  • SSDEEP

    6144:3r5UgEEfUlNJ/mulGRnNlmDrqiql7vrD697vi9bsT:3rZfUlp6NluJI7Dmta9bsT

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1a3a605f85a28f18b874ad0c02b3805_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c1a3a605f85a28f18b874ad0c02b3805_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/408-0-0x0000000000120000-0x0000000000140000-memory.dmp

    Filesize

    128KB

  • memory/408-5-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/408-4-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/408-3-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/408-2-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/408-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/408-6-0x0000000000160000-0x000000000018F000-memory.dmp

    Filesize

    188KB

  • memory/408-10-0x0000000000120000-0x0000000000140000-memory.dmp

    Filesize

    128KB

  • memory/408-18-0x0000000000120000-0x0000000000140000-memory.dmp

    Filesize

    128KB