Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 16:19

General

  • Target

    8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe

  • Size

    198KB

  • MD5

    8b118ce465275c9dd06bf97d723f0c10

  • SHA1

    e1947403aae81de407ed1e4ed2544edd6bf68bda

  • SHA256

    015e9587adbb6454ad1023de0802c7e0dc4173630c1689f3d07f140a3267b5e8

  • SHA512

    6f53fcabdd35d807ecb9347a4d7d7579311b5f9ba570a031a9d0e8efd2b60e37e818d631a5dfb74f1da4024de802745bfe73b2a3a464bb010ec980b1d11150d9

  • SSDEEP

    6144:gEItBvqhI+nWpttCkflvJdVW+UHYqFbP+9Fwj9:gEI+lkN4pP+9Fwj9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8b118ce465275c9dd06bf97d723f0c10_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3848
    • C:\Users\Admin\AppData\Local\Temp\e5764865.exe
      "C:\Users\Admin\AppData\Local\Temp\e5764865.exe"
      2⤵
      • Executes dropped EXE
      PID:1376
    • C:\Users\Admin\AppData\Local\Temp\e5764a56.exe
      "C:\Users\Admin\AppData\Local\Temp\e5764a56.exe"
      2⤵
      • Executes dropped EXE
      PID:3424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\e5764865.exe

    Filesize

    56KB

    MD5

    88d78c9bb9ac40db39c22d8368a889d0

    SHA1

    fa13ac47646b74c0c878f87aec93639af126a324

    SHA256

    367e36b5d5445c2a32e5be22f6a22c81ae98187e5c6fc5e8003272431cb577e6

    SHA512

    c2a409b61f8cc36f63565b7139c665ac483645ac9391fefd34774328b14802b08d44f492b5e4b61631a11b4d184df4b5294c85f0ff4183fa4467f3bcb64ee41e

  • C:\Users\Admin\AppData\Local\Temp\e5764a56.exe

    Filesize

    119KB

    MD5

    64af4c462281885bfdd1f9cdfe1db67c

    SHA1

    a8bc1c6cf7d286678f357cb6cd012952c13a40a6

    SHA256

    f880db62f98487169f4936029833a25b2f7d5477847fd0cd3868e7e1a9f46004

    SHA512

    4effd573e2ba228d272092f48d2ca4c5f904bccfa993dd7ac2915edf54e4d32317fba2c3ec441fa603ccac157dc53e5a5c8105fd145263bab1b1ed35f3f3c98e

  • memory/1376-6-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1376-12-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/3424-10-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB