Analysis

  • max time kernel
    94s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 06:23

General

  • Target

    dbf981955f4586295f2e66a8232e8a43_JaffaCakes118.exe

  • Size

    940KB

  • MD5

    dbf981955f4586295f2e66a8232e8a43

  • SHA1

    774938c0d3df474421cfd45fa00b207095ff324b

  • SHA256

    49c3ed7617f191b2002b16374cf10980ff4cac33850b23cd9d7e930616080fe2

  • SHA512

    9d8884ea687bdd0ae2e7bd7cbff1c9a261f4dd0caff4f70ff0e9c93276ff9bf450f97d479b0cbe36ee4d7e78fc58a6b76408b0efc04c608139d6945824955099

  • SSDEEP

    24576:fAaCiqWGDJz+Cl4D0wzdHguyJTb0wzdH:4vTF+04DLzdH6LzdH

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbf981955f4586295f2e66a8232e8a43_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbf981955f4586295f2e66a8232e8a43_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\MSWINSCK.OCX

    Filesize

    105KB

    MD5

    9484c04258830aa3c2f2a70eb041414c

    SHA1

    b242a4fb0e9dcf14cb51dc36027baff9a79cb823

    SHA256

    bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

    SHA512

    9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0