Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 08:08

General

  • Target

    733bc298334eff734ad5f53c6f718304_JaffaCakes118.exe

  • Size

    55KB

  • MD5

    733bc298334eff734ad5f53c6f718304

  • SHA1

    1eb1a5461189e8ef8f20cc424143c660d8347fd9

  • SHA256

    92a82ea78a9afb6c129438156cd186899bf00c1701ce02a41264b377219aeb16

  • SHA512

    1075de003648ca579ac66884f034310900ad4380765a86c63b3d1858e021c1d57a42bc48e233195c963f5b6a3740e5ea3715c9eb75154a15d57a2685aa9a054b

  • SSDEEP

    1536:Wjl+2lHKITkBXkHbo/8kv+lrbV9P3N1JUi787VKzLvwQEnKXhS:O5HKITkBXkHbo/8kv+lrbV9/N1JUi78f

Score
7/10

Malware Config

Signatures

  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\733bc298334eff734ad5f53c6f718304_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\733bc298334eff734ad5f53c6f718304_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.exe-

    Filesize

    600KB

    MD5

    92eb2eb0a0142f19849f71e408a9ab42

    SHA1

    1d0d573646d010b2c2e57a73ebed774b3b8ae7cc

    SHA256

    42037e51761fe896fc347d5f06dc286984852d260b183258172b75ea9f81b217

    SHA512

    1784b007baedb292dd83822c3e25e0ca1761e64f79f5008d3b469b188d3e8240feb5ce61d753c4df5b8d0a64bdb8b97a9ea5f231d0429d201f300f139d0f7e0a

  • memory/1564-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1564-1347-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1564-2410-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1564-3658-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1564-4250-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1564-4251-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1564-4252-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1564-4253-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1564-4254-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1564-4255-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1564-4260-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB