Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 04:43

General

  • Target

    fdd2141aafce592a4615784d33772af3_JaffaCakes118.exe

  • Size

    689KB

  • MD5

    fdd2141aafce592a4615784d33772af3

  • SHA1

    9330572518165b85df97c3bd371a3cd2a9d2b43d

  • SHA256

    2edc933a4806709e6237ff4efd7977c8b1672082a3963a65bc6d53bb128f3c8b

  • SHA512

    63c2ac55f80a1ca41dd21246501ff3db7c51e8e969ea6d51d325529011597468b4d95e69f81f15dab7234d5c5c4bf552656ff372aad05b97ae82e96b2f79e051

  • SSDEEP

    12288:2hEnaobDQVKF44JdRqcJqglOE+ei9R5qdpJytu5z6vScjx687o/h4Mn1+iMKNiWM:2hEnaonQ2ZHccEgAE+XRU4Q5GlUDn1+v

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdd2141aafce592a4615784d33772af3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fdd2141aafce592a4615784d33772af3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2700

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\E_N4\HtmlView.fne

          Filesize

          212KB

          MD5

          4c9e8f81bf741a61915d0d4fc49d595e

          SHA1

          d033008b3a0e5d3fc8876e0423ee5509ecb3897c

          SHA256

          951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

          SHA512

          cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

        • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

          Filesize

          1.1MB

          MD5

          638e737b2293cf7b1f14c0b4fb1f3289

          SHA1

          f8e2223348433b992a8c42c4a7a9fb4b5c1158bc

          SHA256

          baad4798c3ab24dec8f0ac3cde48e2fee2e2dffa60d2b2497cd295cd6319fd5b

          SHA512

          4d714a0980238c49af10376ff26ec9e6415e7057925b32ec1c24780c3671047ac5b5670e46c1c6cf9f160519be8f37e1e57f05c30c6c4bda3b275b143aa0bf12

        • memory/2700-0-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2700-6-0x0000000001E90000-0x0000000001EC8000-memory.dmp

          Filesize

          224KB

        • memory/2700-9-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB