Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 12:46

General

  • Target

    d464ab3b89965ddf549c949751c7df01_JaffaCakes118.exe

  • Size

    44KB

  • MD5

    d464ab3b89965ddf549c949751c7df01

  • SHA1

    a890daea5df1bf5050b31d53a0b818f8e46afab1

  • SHA256

    f742466ccb0f7dac367be9466fc64db53cff1322ff3651c250f76516cea3f2e5

  • SHA512

    a04e6c169f6f672ede9a786aefb4874a4672871a23f121c63f777053ce31b045e5a26e62ada9a15479dbba5fa40297e12cb4cce2e9719ba7ae21c4c6c32e33bd

  • SSDEEP

    384:pdgWyvlE+Ri0KBuhNnmPe1xK0+VBPefAJS8xgm6RS+wA8lwQA:p2NTi0KBoNce1xK/PSAJS7m6YKQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d464ab3b89965ddf549c949751c7df01_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d464ab3b89965ddf549c949751c7df01_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads