Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 07:46

General

  • Target

    d9e6b4ce347e8c25d95d98470b4fe813_JaffaCakes118.exe

  • Size

    631KB

  • MD5

    d9e6b4ce347e8c25d95d98470b4fe813

  • SHA1

    e93abe212ed719fd5d86c9edecf254b523fbf4cd

  • SHA256

    6b71c51b2634a05601356d3372c024645964502a4af68cecfa8be911d90c37f1

  • SHA512

    3b77040114486c2ecb7414bac017c3dbfe9b1db538dbf7e008b3c80e094f6e4779fe2ff85ca7032050cce9820b4b276ba83217b7ea648745801d5e091e40325a

  • SSDEEP

    12288:tNoFmw6FvnRuzg/axX7JY+eSUSuuFi4A547+8pVpDckHxYfpGc:tNlw8vnRuzg/axLJY+cSJFi4ACy8pVpM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9e6b4ce347e8c25d95d98470b4fe813_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d9e6b4ce347e8c25d95d98470b4fe813_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1872

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads