Analysis

  • max time kernel
    11s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2024, 21:21

General

  • Target

    25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe

  • Size

    276KB

  • MD5

    25a1fa593e9db7717ff6b2c2070fe26c

  • SHA1

    15985603d194ab795290313fabfc6b2746968b14

  • SHA256

    f2b7570e5225bc30e3d2128a147a9bf891600d8868312656ff53fd3842e601d2

  • SHA512

    8b413f306fa36eacbda6e41d747522906da8bc0a335bc8a351211523b574ab0497b3ec6a254d964d4735f79c3c05e3c997ebf13df57565ba007711cdbf247be7

  • SSDEEP

    6144:TaLs+Awsc/mev7aBPon/xlpKJ7XaO/Cy:Ta4+ApLev7aBi5lyaO

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\25a1fa593e9db7717ff6b2c2070fe26c_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads