Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2024 01:28

General

  • Target

    844ec60dc64d13fefc1bfdb364fa0058_JaffaCakes118.exe

  • Size

    148KB

  • MD5

    844ec60dc64d13fefc1bfdb364fa0058

  • SHA1

    7a14709bfb09910af67e2f29ffdf7b184d6bbc37

  • SHA256

    95e641cb2b866e0fc9848e0f8e9c979064f5768ced73b8dd333e0b35ae2cde8e

  • SHA512

    7a9e4bb6fd03f0816bd032b8922f06fb3b44bdda619334d53b724138cf608c0b6bf992934b195487ffcb5bff596d42fa0fbe045ad6580aed4edbb6822d386359

  • SSDEEP

    3072:0sUQvY8RKStZMtiB0JQ+SGGXHR7yVkRL2pVWWE04RXXn6NTOK8lnse4CXv:0sUQ7lZXBaQzlHR7L17Wv4RXXn6sPN4y

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\844ec60dc64d13fefc1bfdb364fa0058_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\844ec60dc64d13fefc1bfdb364fa0058_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bassmod.dll

    Filesize

    33KB

    MD5

    e4ec57e8508c5c4040383ebe6d367928

    SHA1

    b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06

    SHA256

    8ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f

    SHA512

    77d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822

  • memory/2408-14-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-5-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2408-18-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-20-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-8-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-10-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-12-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-0-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2408-34-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-4-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-6-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-22-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-24-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-26-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-28-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-30-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-32-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2408-16-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB