Analysis

  • max time kernel
    90s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 05:22

General

  • Target

    d9b0fcc07a5747252e6f2d088278b20b_JaffaCakes118.exe

  • Size

    460KB

  • MD5

    d9b0fcc07a5747252e6f2d088278b20b

  • SHA1

    5d7e86fabb573852096b509fadeb90f918085cd6

  • SHA256

    f139595b23275490bd08e72dc2366cf3239ed142c4ad42fea1b7403600507ac0

  • SHA512

    cb5cbf1eeef77241a11af663a1e37ecd01031fe2a934a173a78e87097960d5dbbe0bd683884e6ad04d97f90e33cd5a76e23b053b771061b1dc2d5729e1324fe4

  • SSDEEP

    6144:sb5Pxaf2Ilcwa2flHaTLUjsIiI+4E5Xg:sb5Pxw2CcwpflHaTOe

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9b0fcc07a5747252e6f2d088278b20b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d9b0fcc07a5747252e6f2d088278b20b_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3044

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads