Analysis

  • max time kernel
    96s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 04:44

General

  • Target

    JaffaCakes118_db45703941787a232e2eef471c8be616.exe

  • Size

    112KB

  • MD5

    db45703941787a232e2eef471c8be616

  • SHA1

    bcdcb14d5dca8eff4eab884450988ae788eb4b7d

  • SHA256

    bb8959ab353b415cd9f75ee326735225bebc593dea8d37e13cc8c7c29add7eaa

  • SHA512

    efec23aa03c4988e28332f2375b8b96b2ea332515df4fc3b190a8ebf68fe51742f5481236574a563e71b44964eb7a69761d810786ad9cff5fefc67d5443c9e88

  • SSDEEP

    1536:qNeEPspGLeZWP1pJg2qaQp4YAg91puj3GP8pff:qNdKhQtpJg4QtAG1pWFp

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_db45703941787a232e2eef471c8be616.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_db45703941787a232e2eef471c8be616.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2364-2-0x0000000002AF0000-0x0000000002B04000-memory.dmp

    Filesize

    80KB

  • memory/2364-3-0x0000000002AF0000-0x0000000002B04000-memory.dmp

    Filesize

    80KB