Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 01:24

General

  • Target

    54b5a89a75f9d93bc38b8584c274cc1e_JaffaCakes118.exe

  • Size

    150KB

  • MD5

    54b5a89a75f9d93bc38b8584c274cc1e

  • SHA1

    29e2266e101d2d6a9904bfa168e8c4fd2228e33a

  • SHA256

    bb4615333195b8f5babc8b96b2b5b9b5c26fa63778523100736a6b5d6c2895db

  • SHA512

    17eadde668241d8a653675117774b1b0e1b59591f91250697ad53a88f15c53ad26518903939a1477496ec7267d58caf3ef6bb2eb490f982c3b45098f4df9623a

  • SSDEEP

    3072:3R7pL+TLRoKi2AIrYEpX39XQjysyOEpNf6woautqclYQIRY:tAT6fpI/XtXROGKa+q8Y

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54b5a89a75f9d93bc38b8584c274cc1e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\54b5a89a75f9d93bc38b8584c274cc1e_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/584-0-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/584-2-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB