Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 12:18

General

  • Target

    5207b8d633bcc72e1c0990f84c8f4b64_JaffaCakes118.exe

  • Size

    24KB

  • MD5

    5207b8d633bcc72e1c0990f84c8f4b64

  • SHA1

    f496c0f9d8368fef3d20cc11d02028c811d4446e

  • SHA256

    bae6a17eeaac2e70e1b293837034919679ce38025eb600c7602ee0eef42d58fa

  • SHA512

    6f5ba10a57b282d6507cbbe38a1dab3e06e2270150c135247c61b1bd8118eb08784c58e47608f2225b2eb3c860ae4bcb846b0bb98f47d3d643b7f66d688a56e8

  • SSDEEP

    192:/TTKrbo696PC77NZbdR75bqGnfBGBNxGUJlgtrLTDys/4USE:/TuQlPC77N55W4FDys/Jt

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5207b8d633bcc72e1c0990f84c8f4b64_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5207b8d633bcc72e1c0990f84c8f4b64_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads