Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 19:17

General

  • Target

    dce3e0f9af51339c4e251e3a907b69d5_JaffaCakes118.exe

  • Size

    581KB

  • MD5

    dce3e0f9af51339c4e251e3a907b69d5

  • SHA1

    4a974aafff30eea8cc88d7b2e25d4d8602c2e028

  • SHA256

    57e15c8221622e54993b221b4fb917972eeb7dcf63a7c795c73e14691df822c0

  • SHA512

    5806c1ff5bcf66bca7ee0beacad5c3a770bc8ee652ca41f12d7d11f5216c104ecff55209211244f079126a495b5cea1ffb1ea0968dbdf0d53b1af82857bee6eb

  • SSDEEP

    12288:Gg0SuMcp6qilh0NXFQsNr5bLdLF3Z4mxxlDqVTVOCJ:Gg0SuMcQqMCnQsNR9QmX0VTzJ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dce3e0f9af51339c4e251e3a907b69d5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dce3e0f9af51339c4e251e3a907b69d5_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2496-0-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2496-1-0x0000000000280000-0x00000000002D4000-memory.dmp

    Filesize

    336KB

  • memory/2496-13-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-25-0x00000000031B0000-0x00000000031B1000-memory.dmp

    Filesize

    4KB

  • memory/2496-24-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-23-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-22-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-21-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-20-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-19-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-18-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-17-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-16-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-15-0x0000000000630000-0x0000000000631000-memory.dmp

    Filesize

    4KB

  • memory/2496-14-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-12-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-11-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-10-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-9-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2496-8-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2496-7-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2496-6-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2496-5-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2496-4-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2496-3-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2496-2-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/2496-26-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2496-27-0x0000000000280000-0x00000000002D4000-memory.dmp

    Filesize

    336KB