Analysis

  • max time kernel
    140s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 18:25

General

  • Target

    53102f72cb96b80bffbc4f7dfa8c34ec_JaffaCakes118.exe

  • Size

    357KB

  • MD5

    53102f72cb96b80bffbc4f7dfa8c34ec

  • SHA1

    16ec80c486045a4e7a50a3253d07b76415db4472

  • SHA256

    7cdcde860f8244270d4eb8c67c96cc201d0f4c32765039676d7a84813f6c3d81

  • SHA512

    73c46267651b672c5d3f0ea89dcccd60ac2cefc88ab3ccb54e5f8af876b27b58a46f6d8d51460b799d1951c7d35e550bce3a0fafcbb78d402e8718da6c4a2f9e

  • SSDEEP

    6144:d8yZw0EMTNHw7Ip+rKUEqpjyfe03qJf1zw4T/+8zXTfwcDKl+oSUuJ:6Z0btw6+rK5qkfe03j4j+cD4choSFJ

Score
5/10

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53102f72cb96b80bffbc4f7dfa8c34ec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\53102f72cb96b80bffbc4f7dfa8c34ec_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\53102f72cb96b80bffbc4f7dfa8c34ec_JaffaCakes118.data

    Filesize

    1KB

    MD5

    2cb7717d247722626bc28280593f1656

    SHA1

    d4117232f41d1955b379431d4e55a87914f3d9f2

    SHA256

    0515930f372eef0b4c4c08a20723c38f5d72ff0c7265f815835b042ce5e4976c

    SHA512

    986f64e390440b75d2390bb1db5aed2ae50ef5c775a71f27d64e20b06cb452a365a2a5f46596d8b0b501d2b16fe36dee39b93341c16b6b649edc184a168bfa78

  • memory/1760-0-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/1760-17-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/1760-22-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/1760-27-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/1760-28-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/1760-33-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/1760-34-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/1760-35-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB