Analysis

  • max time kernel
    140s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 06:40 UTC

General

  • Target

    a9fa8b33e80d8a9105fc3cefade3d6ab_JaffaCakes118.exe

  • Size

    178KB

  • MD5

    a9fa8b33e80d8a9105fc3cefade3d6ab

  • SHA1

    48b5ee6d811c1c580500cdd535f8acd87ddb1ae8

  • SHA256

    bf82bb193b18171799c0f21fe1d3499d828296be3688f9c255e6b2e919139197

  • SHA512

    31e3d98b2b65e0138113f09a0da26a5048bda8573799fc9e74e25756aa9f58b5f18ab55321b061e45996a4bf95d1046e1a44395b0be9281ffc946a6d10b41fe9

  • SSDEEP

    3072:0fQQ0Bi3/LdiGOrQZvkLR+sw7Wva+kMQ/Kn0MQ9fs8iiUZ/iyxQiX:+QQ/T8zQKLzTkTmQ908iiUJiyaiX

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9fa8b33e80d8a9105fc3cefade3d6ab_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a9fa8b33e80d8a9105fc3cefade3d6ab_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 124
      2⤵
      • Program crash
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2056-1-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2056-0-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/2056-2-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2056-3-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2056-4-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2056-5-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.