Analysis

  • max time kernel
    13s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 11:44

General

  • Target

    da46971aba3536ed3137f41519c40100_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    da46971aba3536ed3137f41519c40100

  • SHA1

    a52093c797f4e7e583580d2102856c09fdd82ae3

  • SHA256

    ec4ec4555fd0942152a1fb5eed92b5b4fe8b09e4088056318b0279f3e1c9ea14

  • SHA512

    4fc13abc35b3adc567112c7b8b3820e40539c37f1c5c2defe5948708a6d41cf98f0e5afd1282d70e59ca72423c6eac04b563d51b334238c30b5acf002f5f1c31

  • SSDEEP

    24576:9EI66/eNkTkS4mEcg0sit6NmcMCD+mdV5rIt94pyMqaW4EZfIs8lWQb0XbECo1eY:9p66nUO/sDLNUtLN7ZzY5wIBbGcTjbl

Score
7/10

Malware Config

Signatures

  • UPX packed file 40 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da46971aba3536ed3137f41519c40100_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da46971aba3536ed3137f41519c40100_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2176-3-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-2-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-0-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-32-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-47-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-44-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-42-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-40-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-38-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-36-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-34-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-30-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-28-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-26-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-24-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-22-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-20-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-18-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-63-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-16-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-14-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-12-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-10-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-8-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-6-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-5-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-4-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-90-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-67-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-65-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-61-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-59-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-57-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-55-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-54-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-53-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-52-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-50-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-97-0x0000000000AD0000-0x0000000000BD0000-memory.dmp

    Filesize

    1024KB

  • memory/2176-99-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2176-100-0x0000000000310000-0x000000000034D000-memory.dmp

    Filesize

    244KB

  • memory/2176-101-0x0000000000AD0000-0x0000000000BD0000-memory.dmp

    Filesize

    1024KB