Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 06:43

General

  • Target

    c279724c0b732affe80b583e1caff995_JaffaCakes118.exe

  • Size

    166KB

  • MD5

    c279724c0b732affe80b583e1caff995

  • SHA1

    191372bd2049307e83583c224b851a9484611b77

  • SHA256

    147e01582989a1a410c6fbf915bc3046f3c1844334bd7a47aac5b389ee93407e

  • SHA512

    fdcece460384f606bec9bc5f6220bdda2e0741f4a13a1a37208b849679c20ddeab07860d41c80881c73b2b130a704265e36c60cd2b03d456c7c7e137675197c7

  • SSDEEP

    3072:LamPnlyO1ccxOTQxlnGMfmT51daijMXR0XlJNOWBv6jk2oqjUqPoVk3tqAQ:Lam/cO1bGQxlnGMmd1daijMB0VZtgEMO

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c279724c0b732affe80b583e1caff995_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c279724c0b732affe80b583e1caff995_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2668-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2668-7-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-9-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-8-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-6-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-5-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-4-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-3-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-2-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-1-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-10-0x0000000075AE0000-0x0000000075AE1000-memory.dmp

    Filesize

    4KB

  • memory/2668-11-0x0000000075AD0000-0x0000000075BC0000-memory.dmp

    Filesize

    960KB

  • memory/2668-12-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-13-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-14-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-16-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/2668-19-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2668-20-0x0000000075AD0000-0x0000000075BC0000-memory.dmp

    Filesize

    960KB