Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 15:22

General

  • Target

    cfd744ed9b6b02b6c46a8bb833c48ae7_JaffaCakes118.exe

  • Size

    21KB

  • MD5

    cfd744ed9b6b02b6c46a8bb833c48ae7

  • SHA1

    3965d65462db71eb8cd00f64df0ca0eb00061e68

  • SHA256

    bf06be0b87e5e8d88a564404a02f3c1cc0dd038377329321c6635cfa5bad6b4a

  • SHA512

    06d7ab2039b74b9ab194fcb0fd0d2c754bf351986fb778c5330202a45713c3e8d7e9540d9888b7c492a5a46c656fab1b7bc6fa29a1db0439d06d872bd856f5ad

  • SSDEEP

    384:tJeuBUvCwB1yUyluoiLKx4bJGML54M02QDJ0dcGazdZkHWK9OaNJawcudoD7U0Cy:tJfBij9LvJGML54MFQC+zdZ1K9fnbcu2

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfd744ed9b6b02b6c46a8bb833c48ae7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cfd744ed9b6b02b6c46a8bb833c48ae7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\369431363.dll

    Filesize

    29KB

    MD5

    07cde94db7aa7916014b4757d1f34c4b

    SHA1

    0998989ccec7b5f7778a9b8aef36849fe4bffbb2

    SHA256

    96ee79fc784c6d0b8e8dfe354ef4694d4662d12653c6f87cf7a1e4b2f8809915

    SHA512

    837aa48269d4abe98ab2e51b2451f64131de7d009cd2447198ff9609b5eb663963d688d0f426a2c5afb449d696e69a2e6577af4dbd9fe95916b8f57b37b09257

  • memory/632-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/632-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB