Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 01:36

General

  • Target

    a0ba9f12f247147cb90a151f1bc40bb8_JaffaCakes118.exe

  • Size

    109KB

  • MD5

    a0ba9f12f247147cb90a151f1bc40bb8

  • SHA1

    29aeabe93089da46319b4f3a5f95f288ac7c9d74

  • SHA256

    b6f24c149cc710cc7caf4a9ab0cb79ac3c02bcc2c18e8b1865879f5908700c25

  • SHA512

    eb2df8e0c230d7e6d0fa495519d59205e3ea31017dbe47fd770fc9f22605f384bec32747aba2f59f2ed49ee3a7688ed2bf347443e96dab24ca4ef108ed832b9a

  • SSDEEP

    1536:ZPd/1U59ObarvFRPMg3wzILQSXu8F3Qhdlu/IXRH5a8MAb2DJBXcqpYjI3P07wWm:9HEO4vF1MqFLQGKdl6I6NAOv8I38vvu

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1344
      • C:\Users\Admin\AppData\Local\Temp\a0ba9f12f247147cb90a151f1bc40bb8_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a0ba9f12f247147cb90a151f1bc40bb8_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Users\Admin\AppData\Local\Temp\a0ba9f12f247147cb90a151f1bc40bb8_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\a0ba9f12f247147cb90a151f1bc40bb8_JaffaCakes118.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:540

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/540-26-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/540-30-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/540-29-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/540-28-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1344-35-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

            Filesize

            4KB

          • memory/1344-32-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB

          • memory/2500-9-0x00000000002B0000-0x00000000002C0000-memory.dmp

            Filesize

            64KB

          • memory/2500-6-0x0000000000280000-0x0000000000290000-memory.dmp

            Filesize

            64KB

          • memory/2500-15-0x0000000000390000-0x00000000003A0000-memory.dmp

            Filesize

            64KB

          • memory/2500-14-0x0000000000380000-0x0000000000390000-memory.dmp

            Filesize

            64KB

          • memory/2500-13-0x0000000000370000-0x0000000000380000-memory.dmp

            Filesize

            64KB

          • memory/2500-12-0x0000000000360000-0x0000000000370000-memory.dmp

            Filesize

            64KB

          • memory/2500-11-0x00000000002D0000-0x00000000002E0000-memory.dmp

            Filesize

            64KB

          • memory/2500-10-0x00000000002C0000-0x00000000002D0000-memory.dmp

            Filesize

            64KB

          • memory/2500-0-0x0000000000220000-0x0000000000230000-memory.dmp

            Filesize

            64KB

          • memory/2500-8-0x00000000002A0000-0x00000000002B0000-memory.dmp

            Filesize

            64KB

          • memory/2500-7-0x0000000000290000-0x00000000002A0000-memory.dmp

            Filesize

            64KB

          • memory/2500-16-0x00000000003A0000-0x00000000003B0000-memory.dmp

            Filesize

            64KB

          • memory/2500-5-0x0000000000270000-0x0000000000280000-memory.dmp

            Filesize

            64KB

          • memory/2500-4-0x0000000000260000-0x0000000000270000-memory.dmp

            Filesize

            64KB

          • memory/2500-3-0x0000000000250000-0x0000000000260000-memory.dmp

            Filesize

            64KB

          • memory/2500-2-0x0000000000240000-0x0000000000250000-memory.dmp

            Filesize

            64KB

          • memory/2500-22-0x0000000000410000-0x0000000000420000-memory.dmp

            Filesize

            64KB

          • memory/2500-23-0x0000000000420000-0x0000000000430000-memory.dmp

            Filesize

            64KB

          • memory/2500-17-0x00000000003B0000-0x00000000003C0000-memory.dmp

            Filesize

            64KB

          • memory/2500-18-0x00000000003C0000-0x00000000003D0000-memory.dmp

            Filesize

            64KB

          • memory/2500-19-0x00000000003D0000-0x00000000003E0000-memory.dmp

            Filesize

            64KB

          • memory/2500-20-0x00000000003E0000-0x00000000003F0000-memory.dmp

            Filesize

            64KB

          • memory/2500-21-0x00000000003F0000-0x0000000000400000-memory.dmp

            Filesize

            64KB

          • memory/2500-1-0x0000000000230000-0x0000000000240000-memory.dmp

            Filesize

            64KB