Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 01:51

General

  • Target

    c20c21b46a259fa8cc3644ffd00707a9_JaffaCakes118.exe

  • Size

    36KB

  • MD5

    c20c21b46a259fa8cc3644ffd00707a9

  • SHA1

    e257d5117d434207386f90fc0cbb3eb1c017b9b1

  • SHA256

    e85f2cf52626c5f6ad36bb1011ca8ddecc0f9c05d4b9c81180684901e391e478

  • SHA512

    291c9c7fe0a9b164e623213bc8d0926aaa64e2738f6e139a4286fa67992bc6c0c9aca7310b9c0e19e9c23869507cf593bb2ecace494d74edf4435b37a8ab5c1f

  • SSDEEP

    384:db41lMNvIZe4A100WrkMxPUD/NfDhM1bERvSG765Gdu1zI3JDAsuEcHZFlT6tMNN:dZeZsCB8Dy166GW5nz8AsuEcHZF9dD

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c20c21b46a259fa8cc3644ffd00707a9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c20c21b46a259fa8cc3644ffd00707a9_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads