Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 04:36

General

  • Target

    c24b1f7c0b26669fbfc128db37fef8f2_JaffaCakes118.exe

  • Size

    167KB

  • MD5

    c24b1f7c0b26669fbfc128db37fef8f2

  • SHA1

    5c34e3d701414f4c6cf1a90c4e41c0fe374a5005

  • SHA256

    7932523f1afadfdfee2b1b688f03aa3745e468f4912036275c0f6dd919e5a378

  • SHA512

    80744992243b002a3289a2d58d12e1afb8d257aee18221358594be47889075ed588a9adc46d23dc4f7f352a3fc431af6bfd2b46d67535a7cd233088ff13e91a3

  • SSDEEP

    3072:jmVW8iTX/3RfldjjXq1+0cxxsWEL02fXcIp08Moef72fslXeY++oM:aM7jJlRexYTHYZMfwst7

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c24b1f7c0b26669fbfc128db37fef8f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c24b1f7c0b26669fbfc128db37fef8f2_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:1292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\macromd\kill osama bin laden game.exe

          Filesize

          77KB

          MD5

          2893518faa1e68ad358515e3db5ab8a1

          SHA1

          9bac2e7fe64331f797e84b8f3e0614ffab84710a

          SHA256

          eaf40495e0f340fec98143bc65d9642f3a26737da571dac56a6f084f7e1737b3

          SHA512

          2e3b2ef028306eeea8871bef78b0c34c8b0dd05dd475e290b5a41271ddb72f0875f8845125ad3353b0afeabd38954ff6ba7df81a0794b38abb3b805fc61f68b5

        • memory/1292-33-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB