Analysis

  • max time kernel
    92s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 18:04

General

  • Target

    23475b24a7de38b4e4591f46911a43dc_JaffaCakes118.exe

  • Size

    2.3MB

  • MD5

    23475b24a7de38b4e4591f46911a43dc

  • SHA1

    36df27aa6d2fcbfdbb3c30cd511edcaef984f850

  • SHA256

    3fb7598fdb9742acb52656b8368ee5d7c5b43c1fb46161ebe728f07a3217d9b3

  • SHA512

    eb57fcc580f6715b911219148033d283be6f64a5934a79db6990fdc34beee00946a6cb945c451b87da405b1b49a1dc06f03b8128190711711b0b58448d18496c

  • SSDEEP

    24576:MTLnjSwLJzaVDOrF4aATrl0OF4winjJaUra3Q:YMOZtATF4win9aUrQ

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23475b24a7de38b4e4591f46911a43dc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\23475b24a7de38b4e4591f46911a43dc_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Users\Admin\AppData\Local\Temp\23475b24a7de38b4e4591f46911a43dc_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\23475b24a7de38b4e4591f46911a43dc_JaffaCakes118.exe"
      2⤵
      • Checks BIOS information in registry
      PID:6024
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 6024 -s 1040
        3⤵
        • Program crash
        PID:4448
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 6024 -ip 6024
    1⤵
      PID:556

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4364-1-0x0000000000400000-0x0000000000569000-memory.dmp

      Filesize

      1.4MB

    • memory/4364-14-0x0000000000400000-0x0000000000569000-memory.dmp

      Filesize

      1.4MB

    • memory/6024-2-0x0000000000400000-0x0000000000569000-memory.dmp

      Filesize

      1.4MB

    • memory/6024-4-0x00000000021F0000-0x00000000022F3000-memory.dmp

      Filesize

      1.0MB

    • memory/6024-10-0x00000000021F0000-0x00000000022F3000-memory.dmp

      Filesize

      1.0MB

    • memory/6024-12-0x00000000021F0000-0x00000000022F3000-memory.dmp

      Filesize

      1.0MB

    • memory/6024-13-0x00000000021F0000-0x00000000022F3000-memory.dmp

      Filesize

      1.0MB

    • memory/6024-15-0x0000000000400000-0x0000000000569000-memory.dmp

      Filesize

      1.4MB