Analysis

  • max time kernel
    136s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-08-2024 21:35

General

  • Target

    b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe

  • Size

    331KB

  • MD5

    b0ed7891dc4f7edf2c5919c80fc612d2

  • SHA1

    e4058f0a748b5195d208b6b7dd8ffddbcc50d130

  • SHA256

    af9158cfa5eb572ee1aad81176bc969ef129fb2935ca3fbbf6491abc97a8d8a2

  • SHA512

    d946f0c38cb0d76fb3d0dddb35de76bb62f709cf0720c0b21dbcca73fb057c3f9941355ca997bc8330808810082d1c0da0681fc98d2337817941e27d8a83bbb0

  • SSDEEP

    6144:10kwSQGyhOiqP+FaceKNetdWQofQB9+5fKQL6NhhrY9i7w4De:WEQN7qP4XebWPf0UKSK9/75D

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 264
      2⤵
      • Program crash
      PID:3244
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3928 -ip 3928
    1⤵
      PID:4172

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3928-0-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB

    • memory/3928-1-0x0000000000160000-0x0000000000174000-memory.dmp

      Filesize

      80KB

    • memory/3928-3-0x0000000000400000-0x0000000000497000-memory.dmp

      Filesize

      604KB