Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 12:54

General

  • Target

    fc5819728df12084dd5a51f9b9da45d3_JaffaCakes118.exe

  • Size

    355KB

  • MD5

    fc5819728df12084dd5a51f9b9da45d3

  • SHA1

    a5960cf8208e3e803d5107d630ce8228b73199f7

  • SHA256

    7e792419c102e64f46b6de8cdcf8b4bdc3dc0b13da6fbaee751f7676b1e34d89

  • SHA512

    c73f0d2cd64510bfce51b8bb56748ac35b47a1d29f3ce1620b3afda5cf2cb19a7c98ea66c3459dd0a83dbaf3e6b85471cabc94f5b2314fa0d033a6405b9d7fb3

  • SSDEEP

    6144:+dRNNx2pmGDa+D39r0JFPlGQD9gjmzjiKyxl/ExEzw15J+yGybbKZQtlk2Y1vASz:ENx2Q+D39QFPhPkcxKw15J2yiQtm5vtz

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc5819728df12084dd5a51f9b9da45d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc5819728df12084dd5a51f9b9da45d3_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\fc5819728df12084dd5a51f9b9da45d3_JaffaCakes118.data

    Filesize

    1KB

    MD5

    79548924126de69d164209bee2ab2afd

    SHA1

    e3512ee5e4180ab5429e540518fc9fe90c3d6e0a

    SHA256

    47c4c6b1ce4ee8e6ff162217ee81f8a6d6c58fc0fba4d6b6c4fe25a7fad9b21c

    SHA512

    b7f10362565549ce399e19d605c6c71569d0dcb5e9c4fcc73d07512aaa131d11fd121ddb1ec3df4c9132a713eee29fda22c168e0112a958ee202fefbb550ca80

  • memory/2460-0-0x0000000000400000-0x0000000000508000-memory.dmp

    Filesize

    1.0MB

  • memory/2460-11-0x0000000000400000-0x0000000000508000-memory.dmp

    Filesize

    1.0MB