Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:16

General

  • Target

    JaffaCakes118_e2b3489edaad3f11751b25926d527ced.exe

  • Size

    164KB

  • MD5

    e2b3489edaad3f11751b25926d527ced

  • SHA1

    ee03882e64ea06cf344e6c6945237c632f4a7883

  • SHA256

    4d4519d6e4dc8f07d4d6a8232588e61e7e23c4f624c2a336908a975a7374deb8

  • SHA512

    ef4bb92884e710007ea497903174d43802d6364cb4cfb809bb30c7134396d4e7e4a9a1bf217846f91ba3cfa1d92800adb19c5283481ce7b366f98ace98ebd472

  • SSDEEP

    1536:KUMy1qakGbbQ4BZ+DMpApXO1YBGSM63c1RxC9rGPqJLm10DsL6bzF03qWyICf7wl:KU2tgYhx328QaLm1N2XF0aWyxf73+

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b3489edaad3f11751b25926d527ced.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b3489edaad3f11751b25926d527ced.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads