Analysis

  • max time kernel
    145s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 00:25

General

  • Target

    8846c256f2a5420df13ce7937af58259_JaffaCakes118.exe

  • Size

    656KB

  • MD5

    8846c256f2a5420df13ce7937af58259

  • SHA1

    a31f4253615576b1d39150f1252a6c30f2cec34a

  • SHA256

    3bd36c0e0bb71498d808496eb361ca8204191b1fbce70edeb4677df765ebc3f2

  • SHA512

    57591422384f2700772cbbee5a86cf029c5af53b908ce83d01054b3a0a79f8aea4ecf32f6120b2411783689801932907fb18ddfa0a3ed5ed0fe44102b6d4867c

  • SSDEEP

    3072:Fd5WXpYI+538b8Hpd3cN+UQTvK96iCAn+hQn2ThLUcP0ZNQrLzHXLkho3zsseDlZ:AYLrLkho3zsseDr

Score
7/10

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3380
      • C:\Users\Admin\AppData\Local\Temp\8846c256f2a5420df13ce7937af58259_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\8846c256f2a5420df13ce7937af58259_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Users\Admin\AppData\Local\Temp\8846c256f2a5420df13ce7937af58259_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\8846c256f2a5420df13ce7937af58259_JaffaCakes118.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Users\Admin\AppData\Local\Temp\8846c256f2a5420df13ce7937af58259_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\8846c256f2a5420df13ce7937af58259_JaffaCakes118.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1264

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1264-8-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1264-10-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1264-14-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB

    • memory/1264-19-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2712-2-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2712-4-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2712-5-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2712-13-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/3380-15-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3380-16-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB