Analysis

  • max time kernel
    134s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 22:44

General

  • Target

    a47043ebc08d6208acfa0705abab2fd8_JaffaCakes118.exe

  • Size

    255KB

  • MD5

    a47043ebc08d6208acfa0705abab2fd8

  • SHA1

    3d2cca2ca894966077b4a3d5de668538ac0bf87b

  • SHA256

    8c65f59eca17f13397e7f909ae815fe7ce3573757a8092cb22d5adaeff337137

  • SHA512

    843713ac68a4cca879eec5a84a16df8235a88d019e7ac2fe0e0406595fc65f25bec0f69e45fd6195d1892709926b19f79a09934f615958e44da00fe7683d8f26

  • SSDEEP

    6144:75va83HXGpT8kz3YCseKMImMUhDWRnVW5GJZ2tNYLj8Mfs6UVGoQZv:75vaeHXfkzIBLMYVRVzYKj86s6wGoQZv

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\a47043ebc08d6208acfa0705abab2fd8_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a47043ebc08d6208acfa0705abab2fd8_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3336
        • C:\Users\Admin\AppData\Local\Temp\a47043ebc08d6208acfa0705abab2fd8_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\a47043ebc08d6208acfa0705abab2fd8_JaffaCakes118.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1772

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1772-36-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1772-45-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1772-38-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3336-16-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-30-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-29-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-28-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-27-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-26-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-25-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-24-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-23-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-22-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-21-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-20-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-19-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-18-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-17-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-0-0x0000000000400000-0x00000000004A4000-memory.dmp

            Filesize

            656KB

          • memory/3336-14-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-15-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-3-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-12-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-11-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-10-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-9-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-8-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-7-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-6-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-5-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-4-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-13-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-2-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-1-0x00000000022A0000-0x00000000022A1000-memory.dmp

            Filesize

            4KB

          • memory/3336-31-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/3336-32-0x0000000002290000-0x0000000002291000-memory.dmp

            Filesize

            4KB

          • memory/3336-40-0x0000000000400000-0x00000000004A4000-memory.dmp

            Filesize

            656KB

          • memory/3336-33-0x0000000000400000-0x00000000004A4000-memory.dmp

            Filesize

            656KB

          • memory/3532-41-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB