Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 08:55

General

  • Target

    007a36d245bf88282050c9865a214af7_JaffaCakes118.exe

  • Size

    24KB

  • MD5

    007a36d245bf88282050c9865a214af7

  • SHA1

    a166da3cb74ab8f85f8ec200ddd755fcfaf872f2

  • SHA256

    abf7479f8f70c4c9633bc3d973d88ed1e99ae205c571f290fd313f77fd962971

  • SHA512

    17cbd9c760e9e3b055d89717445c88a3924a61553636728392033d816e9b7c34bb3aa8069def01ef6c21b996a09eda731b7dc0fc7d338b1faffedc94757dd30c

  • SSDEEP

    384:/TFM3ZwNNIpsgke79siIOiMN69RA0sF3:/q3kMFvJCR4F

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\007a36d245bf88282050c9865a214af7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\007a36d245bf88282050c9865a214af7_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\4.exe

    Filesize

    564B

    MD5

    8e325dc2fea7c8900fc6c4b8c6c394fe

    SHA1

    1b3291d4eea179c84145b2814cb53e6a506ec201

    SHA256

    0b52c5338af355699530a47683420e48c7344e779d3e815ff9943cbfdc153cf2

    SHA512

    084c608f1f860fb08ef03b155658ea9988b3628d3c0f0e9561fdff930e5912004cddbcc43b1fa90c21fe7f5a481ac47c64b8caa066c2bdf3cf533e152bf96c14

  • memory/2492-5-0x0000000002E40000-0x0000000002E41000-memory.dmp

    Filesize

    4KB

  • memory/2492-9-0x0000000002E40000-0x0000000002E41000-memory.dmp

    Filesize

    4KB