Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 13:40

General

  • Target

    744ae2e83b9b1870d556cb351333b059_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    744ae2e83b9b1870d556cb351333b059

  • SHA1

    5fe74ad1f123759737297340e175a5b0185ffc7c

  • SHA256

    f2568cc64d22095ec5ac4ec5ce254fe831696c22492adb89e864c301d168a656

  • SHA512

    8164f70bde00d0898c1917b924d59824710eed887044de3ab413f288d5ae9d78dcc535a4c659e152f5d4fc4204876026ff2df61a87c72f2a08c50da529ef3d6c

  • SSDEEP

    768:3ZlMO0lTyEXhojLpbrRJtxfaokLfDIFDnJ1wSgrzuSB4HNHuBsXeLXYd:3ZlBA3XhojbJtJtkHozdgrKSnBsXeD

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\744ae2e83b9b1870d556cb351333b059_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\744ae2e83b9b1870d556cb351333b059_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\System32\svchost.exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\e57bb32.dat

    Filesize

    56KB

    MD5

    c8c642712b914b34e42c60bef4b6a834

    SHA1

    63f2eab4b8e2b2147007e70ef4d33859f2870570

    SHA256

    f3b4581b769e1747856c8cc803d243366156454c09fe3745f611bb9c1b8230d4

    SHA512

    4b81a8bd708d0acf721c07d319d6f0228dffd513972a9014135d198e25dd0ea7ee0dac21580e631e52381250787eac567898f80df019dc4c03150941103daf7c

  • C:\Users\Admin\IEXPL0RE.EXE

    Filesize

    68KB

    MD5

    744ae2e83b9b1870d556cb351333b059

    SHA1

    5fe74ad1f123759737297340e175a5b0185ffc7c

    SHA256

    f2568cc64d22095ec5ac4ec5ce254fe831696c22492adb89e864c301d168a656

    SHA512

    8164f70bde00d0898c1917b924d59824710eed887044de3ab413f288d5ae9d78dcc535a4c659e152f5d4fc4204876026ff2df61a87c72f2a08c50da529ef3d6c

  • memory/3132-8-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4344-4-0x0000000000FE0000-0x0000000000FED000-memory.dmp

    Filesize

    52KB

  • memory/4344-20-0x0000000075024000-0x0000000075025000-memory.dmp

    Filesize

    4KB