Analysis

  • max time kernel
    141s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 13:54

General

  • Target

    a6e9a630f21b31557a96c8e6c749bfe8_JaffaCakes118.exe

  • Size

    696KB

  • MD5

    a6e9a630f21b31557a96c8e6c749bfe8

  • SHA1

    448abd5e05adb0cb4465fe09744a1eaed38f0fa2

  • SHA256

    c8c6b3dd2eadf7c079a78599d3baa5829dd8a8869b2f6a5732d51039f2d1b8cf

  • SHA512

    3d4c9e201c10492cb8d676fdd6fc775989ca22921239dc259623b3cad5ce4ff61e8334ed10e23d043118a18b9c559639df0a915aac5d9d007b6b5949badcbc24

  • SSDEEP

    12288:srQ9JNNrFA4Ru4ZrI2emqQdAMTx2K/lGRgOUqmq9kR6lhKXuhjiOUqgXB5:sclDA44+IwXdroK/cRgOnmq9g6FhjtUd

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6e9a630f21b31557a96c8e6c749bfe8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a6e9a630f21b31557a96c8e6c749bfe8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\a6e9a630f21b31557a96c8e6c749bfe8_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a6e9a630f21b31557a96c8e6c749bfe8_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/876-15-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/876-14-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/876-41-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2184-33-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-31-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-7-0x00000000023D0000-0x00000000023D1000-memory.dmp

    Filesize

    4KB

  • memory/2184-3-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/2184-2-0x0000000002370000-0x0000000002371000-memory.dmp

    Filesize

    4KB

  • memory/2184-30-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-8-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-11-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-9-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-6-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/2184-37-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-35-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-4-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/2184-40-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-39-0x00000000022B0000-0x0000000002310000-memory.dmp

    Filesize

    384KB

  • memory/2184-38-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2184-34-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2184-5-0x0000000002390000-0x0000000002391000-memory.dmp

    Filesize

    4KB

  • memory/2184-32-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-10-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-29-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-28-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-27-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-26-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-25-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-24-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-23-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-22-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-21-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-20-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-19-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-18-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-17-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-16-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB

  • memory/2184-1-0x00000000022B0000-0x0000000002310000-memory.dmp

    Filesize

    384KB

  • memory/2184-44-0x00000000033A0000-0x00000000034A0000-memory.dmp

    Filesize

    1024KB