Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 16:23

General

  • Target

    d6afdf7298e901b3ee4354912e46f4e8_JaffaCakes118.exe

  • Size

    362KB

  • MD5

    d6afdf7298e901b3ee4354912e46f4e8

  • SHA1

    b8b45ac7b97aa9fbd02f0d5def92b6b04067dee9

  • SHA256

    06121b3d53f3cf0b70b8e440e8ee2ba246ef5a1bd00241de57b0d24c0e34a33d

  • SHA512

    711a2073322a414df1864d1aa4ab2bd23b22fed675fe0d6b8a2068607f8c62f995dc9eac6fff6c3966efeffb915eecb839880f438207f4686a6fe4ea4bfeee39

  • SSDEEP

    6144:hYbu00hlekZ3TERFc4T1VVTgSZHeUdSpB1Js+dJGvg5CRb5l9S3Uy/cUz8rRqQ8q:q0hMkZQXc4TFvNdSH4B5l9S3UyEx1/8q

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6afdf7298e901b3ee4354912e46f4e8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d6afdf7298e901b3ee4354912e46f4e8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1800-0-0x0000000000400000-0x00000000004FF000-memory.dmp

    Filesize

    1020KB

  • memory/1800-5-0x0000000000400000-0x00000000004FF000-memory.dmp

    Filesize

    1020KB