Analysis

  • max time kernel
    143s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 01:51

General

  • Target

    a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe

  • Size

    700KB

  • MD5

    a91c0b1a63856e419d1f899ab20e3015

  • SHA1

    d5461efec07edf1f33c9f0b40060a11d057243f1

  • SHA256

    85b9933bd8318e5643da0fe1f27a802e3ea46358641341a85a4bef39e22843f9

  • SHA512

    505682c930d25e39c66b09ea97a5bfa7c3bf77397885b82027515ecd5a718dfe6f74b37afb2b58143636a752b2d73565f4cc128f1ff8de06d8d7867048dbe3c5

  • SSDEEP

    12288:/mgnpb1tiMrdNtfbtGcC93jhX35oV3cAJzpDqF3Z4mxx1DqVTVOCN:OUb1tiMrdHgcK3jhXpw3RtWQmXEVTzN

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a91c0b1a63856e419d1f899ab20e3015_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4484
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 224
        3⤵
        • Program crash
        PID:4376
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4484 -ip 4484
    1⤵
      PID:3528

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exe

            Filesize

            328KB

            MD5

            082cec8162f276f92c476b8130e828f5

            SHA1

            e909b3bc0cff6c6ec12aa0574f33c230ddabaa14

            SHA256

            61c1425b4b72391ebac0654a826cb3387fcd09694040963f34264559c2dca9fd

            SHA512

            a2f6f7c7d285d2f91728e66373b7ff8a6f16515388b33f6119298732ff0c88a1df16f7983ee8975fdd68ebab5291f63c82370454e98ce9c2dd15c853adde17bc

          • memory/4408-18-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-12-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-2-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-11-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-0-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-10-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-7-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-6-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-5-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-3-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-4-0x0000000001000000-0x00000000010C0000-memory.dmp

            Filesize

            768KB

          • memory/4408-1-0x0000000001067000-0x0000000001068000-memory.dmp

            Filesize

            4KB

          • memory/4484-16-0x0000000001000000-0x00000000010EB000-memory.dmp

            Filesize

            940KB