Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 15:01

General

  • Target

    a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe

  • Size

    358KB

  • MD5

    a71c8d0f3b76d7faa8d12aea50a0a5db

  • SHA1

    452a0c7f6b9da9fb6243ae7e5be8bd993d2a8018

  • SHA256

    5e61ee83b201f01a5c15acc97b2d3402f769c9d0d65df19e562acd2f74ba3711

  • SHA512

    0fa1fa40939c0f66378205501ed7977f95a67bdc69d76cf4052e09acbd24a85048ff7e9b6a27467b92949121f5ddb9c9a89c0251d278a66a4294360c28f8c3e6

  • SSDEEP

    6144:xDnzwMPKotBRuFq/4Y0OQ6iQHWSRpjvpyoWlRlDqDjl4AFyO7QB79VulTweZZ0:aEPBR5/4r6ifSRPFWlRl2t4AyiQpA8eU

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Users\Admin\AppData\Local\Temp\a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a71c8d0f3b76d7faa8d12aea50a0a5db_JaffaCakes118.exe"
      2⤵
        PID:4536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1036-0-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB

    • memory/1036-3-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB

    • memory/4536-1-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/4536-5-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/4536-6-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/4536-7-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB