Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 06:09

General

  • Target

    JaffaCakes118_266b0a90be43765ddd1388d6349e88bbf35ce741b4ba117889a630060e95c357.exe

  • Size

    168KB

  • MD5

    19c9f39493acb7c6fdf0bb6f280000c2

  • SHA1

    a274d466abde971c408ac24716eb74e3ec4c0fe5

  • SHA256

    266b0a90be43765ddd1388d6349e88bbf35ce741b4ba117889a630060e95c357

  • SHA512

    aaa0f1ca54965b3f04d9bd7820b6381c65664089ae1a88d29eec7f44a9b59c341c3d118cefea2501a38e202fb210b599b93a33beedaa90a4a63ad481d1e87d05

  • SSDEEP

    3072:Du5BDPxFKVf8QJpinnEbziNzC6+6YGSpaoNz1A4QOV+V2n0AeO:M78kn9zj+6BS/N5A4DZn0Ax

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_266b0a90be43765ddd1388d6349e88bbf35ce741b4ba117889a630060e95c357.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_266b0a90be43765ddd1388d6349e88bbf35ce741b4ba117889a630060e95c357.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:4144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4144-0-0x00000000012A0000-0x00000000015EA000-memory.dmp

    Filesize

    3.3MB

  • memory/4144-1-0x00000000012A0000-0x00000000015EA000-memory.dmp

    Filesize

    3.3MB