Analysis

  • max time kernel
    140s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 09:49

General

  • Target

    c079bf96fdad1ab368e09d0cc95e425f_JaffaCakes118.exe

  • Size

    2.8MB

  • MD5

    c079bf96fdad1ab368e09d0cc95e425f

  • SHA1

    f3c693ab3bff09067686d2506cb70bbd1447d535

  • SHA256

    e2f637a1e180b551607b4a9c3ef473194335be86a361513a1dc160ca1dfe20fb

  • SHA512

    cef35322c5cc6f597d80c4373fad3a59566ed9e66877b9717fa596dcfc5d3d4a2ee8e29f535225bd14e011e35f79be6b733ec1a1a509ed8253b4c9faf98a1ded

  • SSDEEP

    49152:K0cOF6m0bF1eKLXEm2s91yRvCWTd513Wa1ozSb0CQk5HyX5QqT9Pj:KuF6mCreeEm2s2gWb1Z1ozSb0O5G5f

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c079bf96fdad1ab368e09d0cc95e425f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c079bf96fdad1ab368e09d0cc95e425f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1668

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1668-0-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-1-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-6-0x00000000003F0000-0x00000000003F1000-memory.dmp

          Filesize

          4KB

        • memory/1668-3-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-4-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-2-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-5-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-8-0x0000000003850000-0x0000000003851000-memory.dmp

          Filesize

          4KB

        • memory/1668-9-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-11-0x00000000003F0000-0x00000000003F1000-memory.dmp

          Filesize

          4KB

        • memory/1668-10-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-12-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-16-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-18-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB

        • memory/1668-23-0x0000000000400000-0x00000000009E0000-memory.dmp

          Filesize

          5.9MB