Analysis

  • max time kernel
    142s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 23:05

General

  • Target

    83e8e443256fd46b1cd64e6933c530c4_JaffaCakes118.exe

  • Size

    94KB

  • MD5

    83e8e443256fd46b1cd64e6933c530c4

  • SHA1

    1cd3a981ed4fc3735510a723a605c6205a1e3436

  • SHA256

    8228e3fd12fbed46a7a9761b29a9b1dff369b977acd5a58ce7e1173e0d5a9914

  • SHA512

    dc59400ebf0d74246723e27313dbf9d9af930a0e0dff50de4ee5170d3528235f5852832dc8874a5add14a189616e63d29c57973c657b1f7bc271d20d32cfabf4

  • SSDEEP

    1536:1olin5UF9UePmPkDmoioBCaGHC0/ojYzlsEjq81O0:sSUFzPmcyjoBCdHC0/fFjpO0

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83e8e443256fd46b1cd64e6933c530c4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\83e8e443256fd46b1cd64e6933c530c4_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 184
      2⤵
      • Program crash
      PID:2124

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2712-0-0x0000000000280000-0x00000000002B8000-memory.dmp

          Filesize

          224KB

        • memory/2712-1-0x0000000000415000-0x0000000000421000-memory.dmp

          Filesize

          48KB

        • memory/2712-2-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB