Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 20:12

General

  • Target

    c17bbeb933586e72720bc6ffa495d5ff_JaffaCakes118.exe

  • Size

    27KB

  • MD5

    c17bbeb933586e72720bc6ffa495d5ff

  • SHA1

    43ae8a281ee7f7d705b819b4eca0c91fb98830d7

  • SHA256

    09cba23e12182e374feab11034d6b29498af16c52a92ada0da92e5e49cf9b8e3

  • SHA512

    288270bb6e415849e97695c82d894c5720473860194abd42d1fbe9481b63547938475381e99007cfdce3375cc2685146f973e22c35f162397de5f53bf8dffc4d

  • SSDEEP

    768:RNw9EM3FW0WQ8YgfbHRcaPP1ZSRrKKaOMFo:b7WWbYgjG+NsRrKKa/Fo

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c17bbeb933586e72720bc6ffa495d5ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c17bbeb933586e72720bc6ffa495d5ff_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:1980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\imgrt.scr

    Filesize

    186B

    MD5

    ddd7b9de2762817229b19dcca8e0c7ee

    SHA1

    709f7e1d87760ac2fd5423af466ddfc04090f1bd

    SHA256

    ed0c11884bf8d6680a7b9d9f96795df47aeaec1390d1d27acc228f80199aa72a

    SHA512

    80af0d507dcf9daed8bf0e967618a5fc4b5541076527f8b3af458b480bbeb060ffb6d2fc6c54eac1c2aab7e18192b8a00b8b4e9ae3dfc8cb809bcac1b25d86ec

  • memory/1980-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1980-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1980-8-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB