Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 03:56

General

  • Target

    d990e01fbd3b2968ed5b8f0e1db81f00_JaffaCakes118.exe

  • Size

    294KB

  • MD5

    d990e01fbd3b2968ed5b8f0e1db81f00

  • SHA1

    ef406576049157ec69921f3b7070aae2c788dbd2

  • SHA256

    4a254889535d34ea38b9d427f1594f2f1b0fc1d6091b86340a59949de1b0145e

  • SHA512

    d8b936160aa4f4eb155327e2ce6c30a498511dcc21034454ff94da1d6defdef8f35d0f1545cd07a8caac0a3178866ebb51291d87918ea7e8106adeba0d0a9bc2

  • SSDEEP

    6144:SB0D4ZiDCC98YgIG9zdFHf2H7nYMDl7K2YyHi0+oSotq0:SaD4ZieSgp/FeH75J7CceoSoI0

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d990e01fbd3b2968ed5b8f0e1db81f00_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d990e01fbd3b2968ed5b8f0e1db81f00_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2348-0-0x0000000000400000-0x00000000004D6000-memory.dmp

    Filesize

    856KB

  • memory/2348-4-0x0000000000400000-0x00000000004D6000-memory.dmp

    Filesize

    856KB