Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2024, 22:36

General

  • Target

    268014b85d16362572c91d0f700b4efa_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    268014b85d16362572c91d0f700b4efa

  • SHA1

    3b00d7d5a208f620d5cc17f11001b3a6e1d53079

  • SHA256

    abd0f2ba9257ee163db4a49efb315ba104c56b7f0618f1c0c869154cb9ff3b54

  • SHA512

    66819ba4f0e551bb2c1e2708cb4f49abe2ea486c875d971631b2d0f97666770a69780241c46b10a82a94a7e079feeba6b831643b68f886f8498ac6244722ac4e

  • SSDEEP

    49152:tJl3+5+D9oT7vvTdzn3y9o/HoNBboWA/AKE3i3X+c7w:t6gQDT5n3y9ovoNBbxX35

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\268014b85d16362572c91d0f700b4efa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\268014b85d16362572c91d0f700b4efa_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2436

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2436-0-0x0000000000400000-0x00000000004CF000-memory.dmp

          Filesize

          828KB

        • memory/2436-1-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2436-3-0x00000000003B0000-0x00000000003C1000-memory.dmp

          Filesize

          68KB

        • memory/2436-7-0x0000000000400000-0x00000000004CF000-memory.dmp

          Filesize

          828KB

        • memory/2436-9-0x00000000003B0000-0x00000000003C1000-memory.dmp

          Filesize

          68KB

        • memory/2436-10-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2436-24-0x0000000000400000-0x00000000004CF000-memory.dmp

          Filesize

          828KB