Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 12:39 UTC

General

  • Target

    05d9a0a978db8a0b277bab79281868b9_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    05d9a0a978db8a0b277bab79281868b9

  • SHA1

    401fac313134b6ad6c6ddfde1f3ea3448b6cdcc3

  • SHA256

    76692958158d0aafcb19a666ea4a933b165d44b5277fb29fe6d28b81b367da92

  • SHA512

    0e23061e560ceb25632bddf7705a94df671c43ba4adec289aa195c186cbe4747abcadcfe4ea25412e02a64e6d58a56c32aaab43d1884210bc4e772555a96c6d4

  • SSDEEP

    24576:A0UepO/PsjwPZbsiPIcT4D/fp775qd00r8mv/DkrshDdiPaYGsAueQG+8:sAOS4YcWJvKAmv7kOauaGh

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05d9a0a978db8a0b277bab79281868b9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\05d9a0a978db8a0b277bab79281868b9_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2112

Network

    No results found
  • 127.0.0.1:16181
    05d9a0a978db8a0b277bab79281868b9_JaffaCakes118.exe
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2112-0-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-4-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-1-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-7-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2112-12-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-14-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2112-15-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-17-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-18-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-19-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-20-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-21-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-22-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-23-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-24-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-25-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-26-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-27-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

  • memory/2112-28-0x0000000000400000-0x000000000091F000-memory.dmp

    Filesize

    5.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.