Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 17:40

General

  • Target

    dcbaa750a17b582341277a065ebaa410_JaffaCakes118.exe

  • Size

    59KB

  • MD5

    dcbaa750a17b582341277a065ebaa410

  • SHA1

    2cbac519f997ebbabfb07fab8bd0ed3e2afc63e3

  • SHA256

    66ff3886e5d6102db3350e1335420703e8231cffd5b5859737baed926f2dc9dc

  • SHA512

    a00d5780637578c538627ddebff3c5e6508652b277ec3657492a4a293da5db9b5ba87d6d2eb47697e310798b97cbfdda8d1efc97c8c5ed8b5d655e88127060b1

  • SSDEEP

    768:GL0L2xnu9sBw1JtLSqD3Nkwjy18LSzD3Nhwjy1j:G+9sBw1JhSa3r2eSH3E2x

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcbaa750a17b582341277a065ebaa410_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dcbaa750a17b582341277a065ebaa410_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1984

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1984-0-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/1984-4-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB