Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 12:36

General

  • Target

    d4603050cd0c03798a39b458ce31b2dc_JaffaCakes118.exe

  • Size

    35KB

  • MD5

    d4603050cd0c03798a39b458ce31b2dc

  • SHA1

    5eb44e8fe68e5a59b8aff85e4d671af8c73f4e59

  • SHA256

    5df042cfc4287371baf384c0f9e2cedcba47f47c2c6a92ab4e433a33eed2a9e4

  • SHA512

    ea4118dec07926e03e03016833366ab89fb8447bcec9b25ede3bc8788263b5f0d4174c1ea77aaaab1fc47f596a901de2b8153831755968771b251299a9e3adc2

  • SSDEEP

    768:Z6MLRAgiSTOSd803Sis8GvUakWb1pHYCfcTrqtqe:ZxLRNiSTOSqeIhkWb1eCE2N

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4603050cd0c03798a39b458ce31b2dc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d4603050cd0c03798a39b458ce31b2dc_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4044-0-0x0000000000400000-0x0000000000425D0E-memory.dmp

    Filesize

    151KB

  • memory/4044-1-0x0000000000401000-0x0000000000419000-memory.dmp

    Filesize

    96KB

  • memory/4044-4-0x0000000000400000-0x0000000000425D0E-memory.dmp

    Filesize

    151KB

  • memory/4044-5-0x0000000000401000-0x0000000000419000-memory.dmp

    Filesize

    96KB