Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 14:18

General

  • Target

    c32c851046a9ecc5957cbb214f28ac17_JaffaCakes118.exe

  • Size

    224KB

  • MD5

    c32c851046a9ecc5957cbb214f28ac17

  • SHA1

    e3bb1d0f80ea23c8346eab70d6ffa1951a65752f

  • SHA256

    2f404ab6e70c9c828cdab4c2b5e33b597d0c6ca13cb4e6b7dc3c8e086c360591

  • SHA512

    d3174ce4c278ecd875fa7f259763ea2215d4850c086d84738779ea7e2929b2fcc1a7c74a24605e83998007f0206f9b4f06241d174c2c603c75258cb1f7236490

  • SSDEEP

    6144:VX8fmsKgtn9V6vxeeL5kVhbe0twNBLQg89gj:VXOX9te0twNutg

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c32c851046a9ecc5957cbb214f28ac17_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c32c851046a9ecc5957cbb214f28ac17_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads