Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 19:51

General

  • Target

    a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe

  • Size

    60KB

  • MD5

    a3e6bc5ae46d56142e66699dcd112c13

  • SHA1

    580f38d4c0c54394b452e5ecddc97dd8a5c82a71

  • SHA256

    a9126586febe5b201569c002a20e195ae33c890914268d8ea85a7d31bfe39a7b

  • SHA512

    7b5c5b087ae6729b1abc392b0241ad9d7f5ec3b83c8c8a009f43db2e499d2588a2d8e4cd8bf5a2f76dfde183eaf77a38f3241a994558b1ea4e6aded3553ff76b

  • SSDEEP

    768:7o4+e0pi+Rgy1QzTGfEyN21oiYDsP6EwO:0461gGQlysSDDsP6Ew

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a3e6bc5ae46d56142e66699dcd112c13_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c attrib C:\Windows\KB952567.log -r -h -s
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\SysWOW64\attrib.exe
        attrib C:\Windows\KB952567.log -r -h -s
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2748
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c attrib C:\Windows\KB952567.log -r -h -s
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\SysWOW64\attrib.exe
        attrib C:\Windows\KB952567.log -r -h -s
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2816

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3664-0-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/3664-1-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB