Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 15:13

General

  • Target

    daa040d691c62c0c7e13b800ac00353f_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    daa040d691c62c0c7e13b800ac00353f

  • SHA1

    b2068fba8b6daa627ebde11b919afc54c106989e

  • SHA256

    8607cbfb91464e14bb8f67fdab2c5ff9730f16b9392e88a38444257d97001b75

  • SHA512

    97d0a8b9862c7d672cda96ddc1790648bd483df042ff44f0ea8541b10f0439313738681f276e5b0e89863bd0d624d320f16aff3d2e6645ad02caf2271e5aa5a3

  • SSDEEP

    1536:oIIiaiz12ozcD8mZ2unYrVIi4FnBe/UV1:Oirh9IDdZ20kOTs

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\daa040d691c62c0c7e13b800ac00353f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\daa040d691c62c0c7e13b800ac00353f_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads