Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 21:30

General

  • Target

    81cb875d826bf74051fbb43931196598_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    81cb875d826bf74051fbb43931196598

  • SHA1

    da1e88d7d8e9aa81e605b89bafc7a22bcf432db4

  • SHA256

    07eedffc88c982ba41f6909f471f593ca0ac4dedc62927769244766ff88dc5c8

  • SHA512

    aee7b6fd7f17d6383032979b99dc603299fd20f864fc5632f9244370016a632f6b590dc80270c7859eddfc8a8ec74e14c3f70c2576c4ddf625fc6e079233888e

  • SSDEEP

    3072:GaP4fLqw83saZiTjyPy9KgOJujIjGL75+jNXQk3F6RvAlJfTuJAXwLMBbZcpmS2H:lgzF83GTjyPy9K2et3FT3uJC0pmxrj

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81cb875d826bf74051fbb43931196598_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\81cb875d826bf74051fbb43931196598_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

    Filesize

    31KB

    MD5

    3f66495ad28738e7b35436e860e66ecb

    SHA1

    88ef951315b3dc074dd6a2aecd3fd0829e031ce0

    SHA256

    04bb39ebe8d76d6be3bdc3bb66e208c09bc0cf577f5f8c6d088b6c917fa44449

    SHA512

    bd107d53555b286314ffbe7c70ebdf2d08392dd0d20ded26264e3f28e1956062c20fa48abfca09b163ac46dbb22d320eb664c81ad9380a6151e2701c9069aed5

  • memory/1588-17-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1588-16-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/1588-15-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3032-8-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB

  • memory/3032-9-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB

  • memory/3032-0-0x0000000001001000-0x0000000001003000-memory.dmp

    Filesize

    8KB

  • memory/3032-7-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB

  • memory/3032-6-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB

  • memory/3032-5-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB

  • memory/3032-4-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB

  • memory/3032-3-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB

  • memory/3032-2-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB

  • memory/3032-1-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB

  • memory/3032-18-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB