Analysis

  • max time kernel
    140s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 23:24

General

  • Target

    543588dd3a66ac144d44aa2576cd0419_JaffaCakes118.exe

  • Size

    373KB

  • MD5

    543588dd3a66ac144d44aa2576cd0419

  • SHA1

    5b555182e4589f008c2f7a57ec41c2a11b2604a2

  • SHA256

    161b93fa843ed4aceb1f31975e76814ad15239db0f4f22e2de8952cd6dea1542

  • SHA512

    c5f081c0feda983750c8143b8597325c81375278b7039575a0c47d4bb25781069426c964a6d4adff57a24f7fe64c9df3a74587aebcaa6e386395e359be4ffa99

  • SSDEEP

    6144:SIoCKgTLZKYkTzlGz9gOUb2GBqoOkR6loMnKXAOot2ia54jhX8zqx6XmWIH1oAN:qCKAFK/lGRgOUqmq9kR6lhKXKC2iGPHT

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\543588dd3a66ac144d44aa2576cd0419_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\543588dd3a66ac144d44aa2576cd0419_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1916-1-0x0000000000370000-0x00000000003D0000-memory.dmp

    Filesize

    384KB

  • memory/1916-21-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1916-22-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1916-23-0x00000000030F0000-0x00000000030F2000-memory.dmp

    Filesize

    8KB

  • memory/1916-11-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1916-20-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1916-19-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1916-18-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1916-17-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1916-16-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1916-15-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1916-14-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1916-13-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1916-12-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1916-10-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1916-9-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1916-8-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1916-7-0x00000000007C0000-0x00000000007C1000-memory.dmp

    Filesize

    4KB

  • memory/1916-6-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1916-5-0x00000000005A0000-0x00000000005A1000-memory.dmp

    Filesize

    4KB

  • memory/1916-4-0x00000000007B0000-0x00000000007B1000-memory.dmp

    Filesize

    4KB

  • memory/1916-3-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1916-2-0x0000000000580000-0x0000000000581000-memory.dmp

    Filesize

    4KB

  • memory/1916-0-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1916-24-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1916-27-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1916-26-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1916-25-0x0000000000370000-0x00000000003D0000-memory.dmp

    Filesize

    384KB