Analysis

  • max time kernel
    140s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 04:43

General

  • Target

    e1b94d6c934d2e424a34e6545bc0ff1d_JaffaCakes118.exe

  • Size

    357KB

  • MD5

    e1b94d6c934d2e424a34e6545bc0ff1d

  • SHA1

    b98b04b19b41943e98af624fc5c0dfa9db6072fe

  • SHA256

    de0a9db7107a206d7641b3648466c0ed71e36d12222e6ac27f475a0463144531

  • SHA512

    b3f9850c485058b0753caf50e0791c6aa82f1ad99fe3cfe6363e6af6f933f1052075edda176a29a9c2652cbd1540d180ae8d29e5639fb6d455482309be951b59

  • SSDEEP

    6144:98yZw0EMTNHw7Ip+rKUEqpjyfe03qJf1zw4T/+8zXTfwcDKl+oSUl:aZ0btw6+rK5qkfe03j4j+cD4choSw

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1b94d6c934d2e424a34e6545bc0ff1d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e1b94d6c934d2e424a34e6545bc0ff1d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\e1b94d6c934d2e424a34e6545bc0ff1d_JaffaCakes118.data

    Filesize

    1KB

    MD5

    c0e376172805656c19c3cf0804db56ac

    SHA1

    b792986af9ce201692aeba6f376d8cb8de38a70d

    SHA256

    1a3c0a823eefaf575c3d9068f8b241372c20c7eab550f1a691d05e98c2f7b1b3

    SHA512

    fb436d47d4df6bcc891c00b853c55967a567fba443aae2a17f789532ff12800c455573561a72478f98ab286f8b8d43b2ad4f6c1586e14f289c6a431025cb716b

  • memory/4548-0-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/4548-12-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB