Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 19:12

General

  • Target

    3ba1c52edbd450d8adfb59c1f4871b1a_JaffaCakes118.exe

  • Size

    364KB

  • MD5

    3ba1c52edbd450d8adfb59c1f4871b1a

  • SHA1

    fd3a0037c0dfa7f8d95d0185b80235fb92f5e2f6

  • SHA256

    e458ae6a353a2647ec48842d231d78aa3fb959a3bd5ebfea0ae5766f86bbff8f

  • SHA512

    490d1f1e5b936f827bb33da990afce6c7808f03ffc0627cc36437d73442a617a3200b5bb730c7d36ba894c21a7a10ecb9e07d65bdb6cf28871a36dbc82c48541

  • SSDEEP

    6144:CVxGAen/DFIuDO/5dz7GQBu8P7Gw34tCmoNCcQHbF0Eflc2rsK1aOpd5w5v/b:5p/DFIuK5p7B37GwIQhQHhfdc2wO25v/

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ba1c52edbd450d8adfb59c1f4871b1a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3ba1c52edbd450d8adfb59c1f4871b1a_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2092-1-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB