Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 09:29

General

  • Target

    ef8114ac77a2c5f337c3baa91ed080a3_JaffaCakes118.exe

  • Size

    153KB

  • MD5

    ef8114ac77a2c5f337c3baa91ed080a3

  • SHA1

    082ac81fe4a73349130f0f5fb1d13b70509bb0ea

  • SHA256

    e506c303d32fb9ea8896bc1ec80a6450a261a85e46974bf1ff1e99ad4f5bc85e

  • SHA512

    9ba699b7eefa998cfb3c324b61a9288cf631c79c8b087fabecf465340a0e21810db45993135bb86f2f85236f6a398efa4f8f7e24306b78a3496d068e6ce212cf

  • SSDEEP

    3072:pKDqD9ff+ZYrUEIm7TfCdVmfbhHN6mJWsELYh61IgoJmNHxTANL+SA32:FDdf+ZYAm7TCdVmflHAmJE0hSoJwHK12

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef8114ac77a2c5f337c3baa91ed080a3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ef8114ac77a2c5f337c3baa91ed080a3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bassmod.dll

    Filesize

    33KB

    MD5

    e4ec57e8508c5c4040383ebe6d367928

    SHA1

    b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06

    SHA256

    8ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f

    SHA512

    77d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822

  • memory/2764-17-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-19-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-5-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-1-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2764-8-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-7-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2764-11-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-13-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-0-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2764-15-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-9-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-21-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-23-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-25-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-27-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-29-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-31-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-33-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2764-35-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB