Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 16:19

General

  • Target

    c92c8ba5475337cde480cabe93c22c9a_JaffaCakes118.exe

  • Size

    125KB

  • MD5

    c92c8ba5475337cde480cabe93c22c9a

  • SHA1

    ebf2e2c2e2cbc60387efc7a573cebacf4931ee7f

  • SHA256

    467d009446314020ae4865c99dbbc16312598485d79abf634bf57eb4be1c240f

  • SHA512

    f12f80fe27269abaac1e034b1d8082ddd7e3057b72cbc6358b9af24c63b0b489d89ef116095c681da046692b37255221f323fddc4e01c6d99ff3d58e94358b03

  • SSDEEP

    3072:4I2vfNOgvS+TcAVDj/C5vQz68LRYkZi8SZW91ws:Z2dnvl7Dj/C5Iz68L/U8SZkS

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c92c8ba5475337cde480cabe93c22c9a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c92c8ba5475337cde480cabe93c22c9a_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2068

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2068-0-0x00000000001B0000-0x00000000001C0000-memory.dmp

          Filesize

          64KB

        • memory/2068-1-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2068-26994-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2068-26995-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2068-26996-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2068-26997-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2068-26998-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB