Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 06:14

General

  • Target

    55e5b661a0b3769d84d0d6e0b34e4389_JaffaCakes118.exe

  • Size

    256KB

  • MD5

    55e5b661a0b3769d84d0d6e0b34e4389

  • SHA1

    18e2f2aea57ad1f0e0a499b33f51fe35b7d7ed3c

  • SHA256

    bf82d44857a2a9d751817a6c3533355972af44caa108e05c9cd6cd395e5b61df

  • SHA512

    3376660c51481cba9bfd3386828226eb7df5812adb5cef5b5ba057bcdbfb56d597c7f64d90d587ca34ed4b2737903f721d8f6679c07ebf9710feaf503665ef36

  • SSDEEP

    6144:+n1j4VZQtDmGAhDJuE3APyXE88/n9Yv+qXTpd3wmgIwXZ:+nd4jQ5mGUDR3A6XZCnxqXTpd3wmg

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55e5b661a0b3769d84d0d6e0b34e4389_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\55e5b661a0b3769d84d0d6e0b34e4389_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2224

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads