Analysis

  • max time kernel
    132s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/03/2025, 12:01

General

  • Target

    JaffaCakes118_4015c64a57de7262eb13f1d692b804ac.exe

  • Size

    360KB

  • MD5

    4015c64a57de7262eb13f1d692b804ac

  • SHA1

    5a2e834ec7dcfbafb183ddae920e6b6d901794af

  • SHA256

    f6bd421d9f1d03171902621ba6667fd6c59c3f13771cd972c3cd25f5ca596007

  • SHA512

    0b90b57e420f09859fbb0e4384d8bb577f21c4c715f0a4c78244be5f0d4c8feea5ce690c95b0f7bec9c1c0ec3c13b966f6f6aaec9f44ca71e097b5dadea987a2

  • SSDEEP

    6144:/iTyixB05L7t0J5xp34uGS4G7v4G7AWFH4G7AWF5:qlB05d0rxNNJJAaAW

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4015c64a57de7262eb13f1d692b804ac.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4015c64a57de7262eb13f1d692b804ac.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads