Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 07:13

General

  • Target

    ead3d8fcdcbef5346b1017f9cc308c63_JaffaCakes118.exe

  • Size

    5.0MB

  • MD5

    ead3d8fcdcbef5346b1017f9cc308c63

  • SHA1

    e7edd2b267e118d908542b4e21cf8ac7855d25a2

  • SHA256

    b36d023c3243f3563717f6e502f4e53e81d46e59c1fc563a4007e93c54992b4b

  • SHA512

    56e8e85905a55dff2d461259bdc61876b6f118739d1c0a448c011b08ab3b36876d9037b9cde5db533b874096c42dbd97fe4046a6a10e7a7fc8116e636feb3fc8

  • SSDEEP

    98304:ZVUPfyJ15sjDkaYkw0SR+d28w8jrptjN4+lqL+chYSxaqT:ZSKJ1cAFZsdZ6SchSqT

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ead3d8fcdcbef5346b1017f9cc308c63_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ead3d8fcdcbef5346b1017f9cc308c63_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2372-0-0x0000000000C80000-0x0000000000E46000-memory.dmp

    Filesize

    1.8MB

  • memory/2372-1-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/2372-2-0x0000000000400000-0x000000000083F000-memory.dmp

    Filesize

    4.2MB

  • memory/2372-3-0x0000000000400000-0x000000000083F000-memory.dmp

    Filesize

    4.2MB

  • memory/2372-4-0x0000000000400000-0x000000000083F000-memory.dmp

    Filesize

    4.2MB

  • memory/2372-7-0x0000000000400000-0x000000000083F000-memory.dmp

    Filesize

    4.2MB

  • memory/2372-6-0x0000000000400000-0x000000000083F000-memory.dmp

    Filesize

    4.2MB

  • memory/2372-5-0x0000000000400000-0x000000000083F000-memory.dmp

    Filesize

    4.2MB

  • memory/2372-8-0x0000000000C80000-0x0000000000E46000-memory.dmp

    Filesize

    1.8MB

  • memory/2372-9-0x0000000000400000-0x000000000083F000-memory.dmp

    Filesize

    4.2MB