Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 15:56

General

  • Target

    c114ef4840b7578bd20868843a27cae5_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    c114ef4840b7578bd20868843a27cae5

  • SHA1

    90eb6b129f0517f381f896e82fd2ae1aa24273ca

  • SHA256

    40d881ec8ff79021ee5466f2b20dfbc86cc18e455089dee7d7d068be559c7190

  • SHA512

    fe89330ce866535a73f0115d964812319be6e25b43cee8ee82e6d652262c3eeea9d126f498186a546ff88c9fce57248c21de032f22402ce2d12ad48541c080e5

  • SSDEEP

    1536:0songUqpmVH3Y9D/Uhy1jjxa6jKTvFPhwMl0aCdwAzgPVX+J:0Ap83Y9D/Uhy1j1a6jKDxNOdpg9OJ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c114ef4840b7578bd20868843a27cae5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c114ef4840b7578bd20868843a27cae5_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2136

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2136-3-0x0000000000307000-0x0000000000311000-memory.dmp

          Filesize

          40KB

        • memory/2136-2-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2136-1-0x0000000000400000-0x0000000000412A00-memory.dmp

          Filesize

          74KB

        • memory/2136-0-0x00000000002C0000-0x00000000003C0000-memory.dmp

          Filesize

          1024KB