Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 10:57

General

  • Target

    e252bee451b31c9bf2ce2153099c5622_JaffaCakes118.exe

  • Size

    216KB

  • MD5

    e252bee451b31c9bf2ce2153099c5622

  • SHA1

    2f9b92c582d7973d991fd19d71ccf55dc1a0a47a

  • SHA256

    10b74a4e8a80b13fcd06519f302d4c37371825160d3284dcd1c083549e1a8647

  • SHA512

    964254c2e7b77755ba32aaa744366b1804ea5ba668f8c232b243ad2aa03ff7e97a69751b99b66c72fa4dc494a0fed389b096e325118774de758d8c50c6a575c3

  • SSDEEP

    6144:oKN+HHiVx+fJQxAdTB7a8AYzBKhSWFsVrq:HQHCVCQxATm8AiBqSNq

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e252bee451b31c9bf2ce2153099c5622_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e252bee451b31c9bf2ce2153099c5622_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2504-0-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2504-1-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB