Analysis

  • max time kernel
    94s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 23:55

General

  • Target

    c1db1b39f67ce397baa2b492c8d11457_JaffaCakes118.exe

  • Size

    635KB

  • MD5

    c1db1b39f67ce397baa2b492c8d11457

  • SHA1

    edc7f65d3a390b1cc8ee8b5d43279047fb4d4e46

  • SHA256

    59a03ae9d1e1d5f6bc72e1e5ba243ea0d65503f5a58f71ad6767b64e0632c071

  • SHA512

    48321d540aeaf58aa87b38ebe54eda523b5b5f1ab1f8e5a317ca45dfa334daa2487085064e11245ff2840abf50d0b95ba7c968db08800ef9d7d969c80a9fa41c

  • SSDEEP

    12288:cIbPsXD/YIYkaJou7JYOoujbeWADdAq08rWrDUj8p9K:cesXD/YIYkaJogJYOBbeWADdAqfWrDUT

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1db1b39f67ce397baa2b492c8d11457_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c1db1b39f67ce397baa2b492c8d11457_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:376

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads