Analysis

  • max time kernel
    135s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 18:36

General

  • Target

    8b83f87a013d3674008eeb3f36520eef_JaffaCakes118.exe

  • Size

    180KB

  • MD5

    8b83f87a013d3674008eeb3f36520eef

  • SHA1

    360f3e8c87523e13766828b0fa43d01f3eb11a70

  • SHA256

    ccf42782bf4dbc5e467cd582c986be1f2e36b1b4c66c882eab4efc6fdbe24384

  • SHA512

    a0f72c58d3fd3289cfdd666d708b5903f663010e4946ecbc05227487fc78625cc2e6c55ed2ba240c73f8340b2e9d17f0090a8cf0e22ac889637c4ca871d7194a

  • SSDEEP

    3072:JW9ys0FU/RiJwRkOndQ03yNWRySUhSPNO7CXfQRVlIjHHmuTS5Xc+ow0BvY:o9KWRiJE3PgJk4eXfIQJ+XxoXW

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b83f87a013d3674008eeb3f36520eef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8b83f87a013d3674008eeb3f36520eef_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\3544c74e01203192b946978cb1705a16.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3544c74e01203192b946978cb1705a16.bat

    Filesize

    219B

    MD5

    184cb6d06d768100135afb136d2b9bf8

    SHA1

    0ba8d5bc51e6a6111ccec98602bb0159e97ffed2

    SHA256

    c6384b6f674ac97581364751e5d5f306b2b8a765e2be66df279f1c65739c3492

    SHA512

    895863ed392071635911a09d885f652b9bba5f729e8cef73847acd6fcb7316086fe85ed632363fb5f2d8d84601ec99707f0d0714ff4956bb0814e853a13c47a5

  • memory/2572-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2572-11-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB