Analysis

  • max time kernel
    106s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 18:50

General

  • Target

    8b8f56b555b2284d736892c7becf5842_JaffaCakes118.exe

  • Size

    24KB

  • MD5

    8b8f56b555b2284d736892c7becf5842

  • SHA1

    aa5fd37e7df98f9b67cd7c2607f08609d3c35afd

  • SHA256

    aa77ebb4d03ebcdc0ed219b294524875e11f83ab3fe4924f939d8e4dbd0c1cda

  • SHA512

    fa2f0c5418597d2a7e8fb9cc84bb191cdf232ac486e1e355763cd3cb834e6ecea06626a60135fc607bd1b187f7538eed24cf392e143ae60f59b866d0d13c0d91

  • SSDEEP

    384:zxBVkOnKrrK+hHs/Y6wHU1Gr0EasFOsKsO5n2e+UWPhrAiET5NUpHGoS:zxBV9nKrrK+MYDHOGrLS2e+UWPhMiElB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b8f56b555b2284d736892c7becf5842_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8b8f56b555b2284d736892c7becf5842_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\SysWOW64\frmwrk.exe
      C:\Windows\system32\frmwrk.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:1924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\frmwrk.exe

          Filesize

          24KB

          MD5

          8b8f56b555b2284d736892c7becf5842

          SHA1

          aa5fd37e7df98f9b67cd7c2607f08609d3c35afd

          SHA256

          aa77ebb4d03ebcdc0ed219b294524875e11f83ab3fe4924f939d8e4dbd0c1cda

          SHA512

          fa2f0c5418597d2a7e8fb9cc84bb191cdf232ac486e1e355763cd3cb834e6ecea06626a60135fc607bd1b187f7538eed24cf392e143ae60f59b866d0d13c0d91

        • memory/1924-7-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2872-0-0x00000000001C0000-0x00000000001F5000-memory.dmp

          Filesize

          212KB

        • memory/2872-1-0x0000000000401000-0x0000000000405000-memory.dmp

          Filesize

          16KB

        • memory/2872-6-0x00000000001C0000-0x00000000001F5000-memory.dmp

          Filesize

          212KB