Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2024 15:51

General

  • Target

    ab9f8ff25fd3743f3d61a437585875d0_JaffaCakes118.exe

  • Size

    292KB

  • MD5

    ab9f8ff25fd3743f3d61a437585875d0

  • SHA1

    f3ab4db1e91b463a8283d276bd23019acfeeffd4

  • SHA256

    e7ff23e8b97c684e64df6e39c6094cd8ba20e6fe54876a065502347f91c30cf4

  • SHA512

    ad6375914eea08086f1b6fe56ea156ac1bf8567c040e21b2a66b818c890dbe21505f9f7d9337a8f915be4b25e591222bf9ad9f23471ab876c4e208a124e683de

  • SSDEEP

    6144:yodIZSbDMuNpATz/BpMTFWh4HPKYD1cs/weL:5CcbDuz/BpMMh4HiYDmsl

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab9f8ff25fd3743f3d61a437585875d0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ab9f8ff25fd3743f3d61a437585875d0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Users\Admin\AppData\Local\Temp\ab9f8ff25fd3743f3d61a437585875d0_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ab9f8ff25fd3743f3d61a437585875d0_JaffaCakes118.exe
      2⤵
        PID:216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/216-3-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/216-5-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/216-2-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/216-0-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/216-7-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/216-6-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/216-1-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/216-8-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB