Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 20:23

General

  • Target

    71184c5657892400827aca7825c5380a_JaffaCakes118.exe

  • Size

    169KB

  • MD5

    71184c5657892400827aca7825c5380a

  • SHA1

    72445a68989c32f6a18557bb4755838d7b560e18

  • SHA256

    af05088ea3f59c6e12e91f0da8fa2e6832bfbddff66d7cef9afd0e2bf53fdd6d

  • SHA512

    3d24d679af8e23ea8f3dec10680d83e58e21de232e6519c5073bc2fff8bcafcbb4114afb583232888fe6701d986fc60f822e5ca39be629d83ec7431877a77903

  • SSDEEP

    3072:jNDB/1NWqQ1CWwODcUGTnJdkw/j8hgm2wo5mP8:NEcUh2jEgm2wj0

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71184c5657892400827aca7825c5380a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\71184c5657892400827aca7825c5380a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\71184c5657892400827aca7825c5380a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\71184c5657892400827aca7825c5380a_JaffaCakes118.exe
      2⤵
        PID:1596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1596-7-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/1596-5-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1596-4-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/1596-2-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2152-0-0x0000000074731000-0x0000000074732000-memory.dmp

      Filesize

      4KB

    • memory/2152-1-0x0000000074730000-0x0000000074CDB000-memory.dmp

      Filesize

      5.7MB

    • memory/2152-8-0x0000000074730000-0x0000000074CDB000-memory.dmp

      Filesize

      5.7MB

    • memory/2152-9-0x0000000074730000-0x0000000074CDB000-memory.dmp

      Filesize

      5.7MB