Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 02:28

General

  • Target

    08720a29f7268fad4672b38cf082bdf2_JaffaCakes118.exe

  • Size

    24KB

  • MD5

    08720a29f7268fad4672b38cf082bdf2

  • SHA1

    bae49ca4ef82554db912661a094bb4ff0e729995

  • SHA256

    acd50b7bcdd310988512c5d1d663b0ede95d55baa15ba79e30c6b44179920f61

  • SHA512

    67f1be3bd0dc1166da9d26300b5a88497905ae6bb4d9115c37266455a9fa3fd6fffcf5370c6e0bd41ae4149fd9a148a8f54be6182357abbe1443477b9972dbf9

  • SSDEEP

    192:mhDDssXg1NJPlhBtP0E7j3x/kluWAVD1ILre5+SW3tjcn8k:+3s6grhlhBl0oxFfiLrOStjc8k

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08720a29f7268fad4672b38cf082bdf2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\08720a29f7268fad4672b38cf082bdf2_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1872

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads