Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 01:58

General

  • Target

    JaffaCakes118_07d2c3ef2e0067bf3ab7ebb589e87481.exe

  • Size

    80KB

  • MD5

    07d2c3ef2e0067bf3ab7ebb589e87481

  • SHA1

    e597e8afddde27e2b7016d513544e46196e9cdfc

  • SHA256

    1bf5d0352077d44df01931aba5b9f9e9259114a64b793b9c0e7e5fcb35186a53

  • SHA512

    4a64d07850e81ceec6117dcd1736c7208090e1e70ddb63d8f0bb0250fbcb8d6e9368453b26d05919477d782c0e7824e38be26b849a831a2b66c457eaebfad5d1

  • SSDEEP

    768:AMif7qfj9JhIfiVqzQ36Oai9Icnu+gZJWBZ+uMEIRfhTGNOUYADhHuqB/0FL:AMiHwb30i9urJUZvZ0EwmhLB

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_07d2c3ef2e0067bf3ab7ebb589e87481.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_07d2c3ef2e0067bf3ab7ebb589e87481.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1088-2-0x00000000002B0000-0x00000000002BB000-memory.dmp

    Filesize

    44KB