Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 01:21

General

  • Target

    844a4f1318ff818bb400c3d50bcdced7_JaffaCakes118.exe

  • Size

    4.2MB

  • MD5

    844a4f1318ff818bb400c3d50bcdced7

  • SHA1

    be5161d5a6da6ac8a11fafb29106c7d4913cdcf6

  • SHA256

    bd78f67b0c86b59268419b96a850c92745b518e53ef0af89454e16ea355b59de

  • SHA512

    251de454defb4f26e677644de87a401444b27f6ad482893f2260d2afbfe571f4c94181fa6124465b6c022e65ed37e5668b0bbbcb4d92ecd8948e876fd0c3a6e5

  • SSDEEP

    98304:emhd1UryeCkWgK5rxEaVLUjH5oxFbxCVLUjH5oxFbx:elizFj7VUjZEdCVUjZEd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\844a4f1318ff818bb400c3d50bcdced7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\844a4f1318ff818bb400c3d50bcdced7_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\B5C3.tmp
      "C:\Users\Admin\AppData\Local\Temp\B5C3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\844a4f1318ff818bb400c3d50bcdced7_JaffaCakes118.exe 1795E09FB1BA6A08B3C4F80DCA03A0A8E92AB0FDA743DA3CF4C8BB94B7D5B563D504D259390B66A81F9AF66B615FDBF132C11557B4901662CE70830C46E19C8C
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\B5C3.tmp

          Filesize

          4.2MB

          MD5

          420187011d6f271fc72d1de1b84e05a4

          SHA1

          111f3ddb8109704e92df739c2db844b5c4735810

          SHA256

          3bf42007e32af959312ce88847200e6a306e9a10b3a46620463b7ba66b14fa4e

          SHA512

          6a2d258c75ab762878ee09e01f0f1b4f53459c076fe611871f5e4676daf2d66e84f2da380857f6355f80e07833bcc4e0d8a487962bff1d8d5c316ae965e289a0

        • memory/1924-0-0x0000000000400000-0x0000000000849000-memory.dmp

          Filesize

          4.3MB

        • memory/3004-5-0x0000000000400000-0x0000000000849000-memory.dmp

          Filesize

          4.3MB