Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 15:20

General

  • Target

    f014849dd9e9053fc8ad93afa8e25c85_JaffaCakes118.exe

  • Size

    805KB

  • MD5

    f014849dd9e9053fc8ad93afa8e25c85

  • SHA1

    4c206c4618fd076d91537acae664dfa1754ba785

  • SHA256

    162d04063d4f88549069dc73b5df4ed77918da937f007ee0e6cf25afb2c331c1

  • SHA512

    25b85058f5bbe349cacb31b7f3f49fffa9af5356e69d0b805db6c48d9f7258953d3bdaed26ef3b952c6199315306818c5200e96bf552485848993d86eae208e7

  • SSDEEP

    24576:1+hK0lg+KFd2+gtxN3s0trK5XNj85waAdr3G9O0aM1:1mK+KFKxNhrK6wDp90ae

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f014849dd9e9053fc8ad93afa8e25c85_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f014849dd9e9053fc8ad93afa8e25c85_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads