Analysis

  • max time kernel
    140s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 15:57

General

  • Target

    JaffaCakes118_98dfe7079947670467af8248385ca27b.exe

  • Size

    364KB

  • MD5

    98dfe7079947670467af8248385ca27b

  • SHA1

    fd45ea4657678df2ef80ab62f7e2829801601c2c

  • SHA256

    4ddede4472df59b5581371d0d83e55d184da9df457b3bfc0633477c56ae7ea06

  • SHA512

    567376c0dbe6b514fbabb2cd5fd3942db96abfffffd73fd69f384474dac29680748fa8f7e1d90af2d61f4d33ebeb81a120d05d8dff0250a5ea0c89a517823d80

  • SSDEEP

    6144:gxJ61E0Fg0C7pzNZT3KUDEeuH4RU0yDaytuxcz7TPUhKuh91RpPaYoSMKV:gxgvC79NZTaGuwiuxu7Tkf91RpPdoSjV

Score
5/10

Malware Config

Signatures

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98dfe7079947670467af8248385ca27b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98dfe7079947670467af8248385ca27b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\JaffaCakes118_98dfe7079947670467af8248385ca27b.data

    Filesize

    581B

    MD5

    35890502abed4e50ad9e2a77752876c1

    SHA1

    b4e5e207963dc77664011d5fe3c6a9b71dad665b

    SHA256

    f8f74b16d3010991b0e55b5eb3f5baa3d83a1f29d3954a00831f442974c0133e

    SHA512

    825825512cdeffbe78b063320ccf5277318d557e6e1ffd5034af49fb3aa9a341ad7bbf210e394aa1be27b21cfc6d07392e48416195972076f1ba0416cce17da0

  • memory/3756-0-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/3756-10-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/3756-11-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/3756-12-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/3756-13-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/3756-14-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/3756-15-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/3756-16-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/3756-17-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/3756-19-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB