Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 22:08

General

  • Target

    adbaebe78281b63b168b6de9164252c8_JaffaCakes118.exe

  • Size

    364KB

  • MD5

    adbaebe78281b63b168b6de9164252c8

  • SHA1

    b74035b49476ef25c5ca4f1fed99039ac5b308c3

  • SHA256

    aa7511c1a75772a268d527c6c1e11dcb5abdcfcaee93f1cc92821cc3332fd7cf

  • SHA512

    619bf81d35ca53dbbdce9621d01de6a62851ccdf5cabf2c6d725d07bde8f1f303c0b96d2fc2cd2334a25e542376436bc13b46ad8e4adef6052306d3cb5353431

  • SSDEEP

    3072:K7xsFzLPyVX+Gnog6VVNW2kHaZua626t90KDMq/I+GF65ez/2mracRKvhJz/RkkG:ex3Z6Vl2aZH8VDhA+GFpzPraUKvhJA

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adbaebe78281b63b168b6de9164252c8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\adbaebe78281b63b168b6de9164252c8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1924-2-0x0000000000660000-0x0000000000673000-memory.dmp

    Filesize

    76KB