Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 10:18

General

  • Target

    a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe

  • Size

    127KB

  • MD5

    a665896c9edfe05d4c93caad97aa6470

  • SHA1

    2da11e36352a76d4908d1d6f8c668e9387d7e03f

  • SHA256

    189da24af7d49bc5e4d20bcd64cde74f7bb076b7f23216ade7db5e9e788a0faf

  • SHA512

    f3b125fb5e1507c0406c40374e40985b274bbae2cf92123bb910c98ef4396cb4f0f3171ef8635da450d9e4903f486338d49f36afbbaabee586179b7c4266faa0

  • SSDEEP

    3072:4/6wJQi3dmGpak1sGb6cUmGvdhYVKwXzS3ZqcF9GOL:66tiNmI/Ydhkm3UY

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Windows\Temp\a00363.bat" "C:\Users\Admin\AppData\Local\Temp\a665896c9edfe05d4c93caad97aa6470_JaffaCakes118.exe""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\Windows\SysWOW64\mode.com
        mode 69,20
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1800
      • C:\Windows\SysWOW64\reg.exe
        reg import 9.reg
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2384
      • C:\Windows\SysWOW64\reg.exe
        reg import 2.reg
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2060
      • C:\Windows\SysWOW64\reg.exe
        reg import 3.reg
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Temp\a00363.bat

          Filesize

          694B

          MD5

          ad139a2603f59dea9d23b1f3835dec75

          SHA1

          2e64fa8f2e6e83e8b42a739a86fcafd3fe76cc69

          SHA256

          55036a682fb45268c22432ec647e877267bf814e3e643e2a566a1249d2d6bbb0

          SHA512

          bd2e271dd9af0d618f67aafed1294b71bcd7e2dd7856dbdf0d56e0f0077e38ae913070d72455057376ef48000892ce913ddc5b0e12db2549c734091b6993f007

        • memory/2288-9-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB