Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 14:01

General

  • Target

    303b4156afb94766d62e19f129786575_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    303b4156afb94766d62e19f129786575

  • SHA1

    cbd49d312ca393b2d8698746a4283d676d7c179b

  • SHA256

    60182b03ed7b2627059b07d835ded1567b9c2ed426914755f3834c87cd60b00f

  • SHA512

    516271ede070230e1a51479948410a070ef7cbbb998afd15355826646e32d5a9dcd096cb4b139d83f280f58a3174273a53e5e0b0c3f120b31006f54655f3af9a

  • SSDEEP

    6144:dqb+EHPYnj8YZAk50ZokyvKNBCMmlmkcrLNQbXMsz9wE:45Ynj8YZAk50ZokyvKNBCMdkwZQ7p9wE

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\303b4156afb94766d62e19f129786575_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\303b4156afb94766d62e19f129786575_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 188
      2⤵
      • Program crash
      PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads