Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 22:00

General

  • Target

    ea0bd78022bac3ecaf73fa38caca31c0_JaffaCakes118.exe

  • Size

    20KB

  • MD5

    ea0bd78022bac3ecaf73fa38caca31c0

  • SHA1

    79805cca98a5654b6be6bf43eb753bcdbb8c0bfb

  • SHA256

    74ca2854f237945fe850945940118b23ec545bc6919ed6798da6d0d146b5682f

  • SHA512

    f70c29c8a1fe87e6fa6a1093e683f0712d038089cf79ac0b2e44bea040a33fc279bf14843ad9f8bcf7147de139a30b1e2595be19d4665da1af948eb7e22cf053

  • SSDEEP

    192:W8+qEA0SXFGe2ZP3y5w3xW5DrRxwcmG9jAz+p:WC8KFGfZPi5wotRxwcBjAz+p

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea0bd78022bac3ecaf73fa38caca31c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea0bd78022bac3ecaf73fa38caca31c0_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4564

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads