Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-09-2024 15:20

General

  • Target

    e71d9240698a0494eaab2131ccd97d9d_JaffaCakes118.exe

  • Size

    376KB

  • MD5

    e71d9240698a0494eaab2131ccd97d9d

  • SHA1

    1a18b45d601c48d06994643d59d9be05e870d3dc

  • SHA256

    315858c7c94a43a030185e54d27589105782711ed4c20dc33eb6f650a55684a5

  • SHA512

    52b51c523479a56bfe77fec5e844c17cac8772cb1109359b9ad990c03e055bb52648ca9a446b1ca9310db858861882a55bf66d2ffad48bac29603eac15805562

  • SSDEEP

    6144:BuCF8t3ptd3fnc+GM2WmjniL+UBEy9HOe/wlePqVZCL+fD/jk7QuDsVsSMBqXYvx:BuCF8t3ptBn/B2WH+uROQw0PqYojbuDL

Malware Config

Extracted

Family

cobaltstrike

C2

http://quickomni.com:443/image-directory/sitemap.mp3

Attributes
  • user_agent

    Host: google.co.in Connection: close Accept-Encoding: gzip Accept-Language: fr-CH, fr;q=0.9, en;q=0.8, de;q=0.7, *;q=0.5 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.111 Safari/537.36

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e71d9240698a0494eaab2131ccd97d9d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e71d9240698a0494eaab2131ccd97d9d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2132

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2132-3-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB