Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 20:55

General

  • Target

    4424d086cdc0694654e1bf3428aded05_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    4424d086cdc0694654e1bf3428aded05

  • SHA1

    83827a7810e9b81f79455145e404af1e027240f7

  • SHA256

    9d13322f69b1ea02698c3eb53e584dd988864cb7aa2d7319c860704ef0b7a8af

  • SHA512

    b50b5af098ab13bf9d80eaff649fb98c74337f6efffc6b2853fc269ade7a0a5d2bffce77ce8672f4d58c7975c117391d92f38513725aeb5841d4d95510724394

  • SSDEEP

    1536:/UPAHDaEjmj0YDqH8qwFRUtTYlfkiU3njEOII4cBGwMhj3A6JugY:c5EPYbVFRUJYSARIUBhj32g

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4424d086cdc0694654e1bf3428aded05_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4424d086cdc0694654e1bf3428aded05_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:276

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/276-0-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/276-3-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB