Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 05:08

General

  • Target

    6a58a8092b2acbdb16f83ec85ef8198a_JaffaCakes118.exe

  • Size

    280KB

  • MD5

    6a58a8092b2acbdb16f83ec85ef8198a

  • SHA1

    c588afccf62ccba361097cf142f56eb213b9303b

  • SHA256

    0e03e08d8dfbeca2c621246b6a969cf61e965bc12b334c9b63c33d6494f5f1e9

  • SHA512

    7d615575a0e18d78ab278084366ed158a10c3b04054a7533eb7d1c6fa7568741b90c9cdcda4b02c8b7ddfdfef29011407863f9aac6739836cf7595f96b8f5ba9

  • SSDEEP

    3072:MS73XjWtZiZmvGTMbom4IkOMFAQSnJJIq8rK5t/C/5lCcX:MgXiHomvG4ouMFAb4atslrX

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a58a8092b2acbdb16f83ec85ef8198a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6a58a8092b2acbdb16f83ec85ef8198a_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 36
      2⤵
      • Program crash
      PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads