Analysis

  • max time kernel
    134s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 22:26

General

  • Target

    b116b08bc1861b5f317aad64aff96ac8_JaffaCakes118.exe

  • Size

    2.6MB

  • MD5

    b116b08bc1861b5f317aad64aff96ac8

  • SHA1

    285963c5ab6033ae9ccb1be0df9c06e9649a924a

  • SHA256

    33341fdd8e5f6499ec8e633324f5bce71285a719c772e75715d02a8fa65c1f81

  • SHA512

    e159b45bf9ff1b3e4b5df1969f5b432123a58805eb499a4a90085b1bfa64529c4ad04921eaf504aa32f50ac8d553ab07a23936b07cdeb13feb279b1945c4b2ce

  • SSDEEP

    24576:MvBLUvDXu4I/PC8XKodt6THeF02tq1kELUaP0ATq+s8SytkYMXFLuDr/BZRWseZT:MJEIXCUWkGUM0AWRByUL+aQA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b116b08bc1861b5f317aad64aff96ac8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b116b08bc1861b5f317aad64aff96ac8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\reyh30603.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\reyh30603.bat

    Filesize

    183B

    MD5

    520cabccf4d34ff78af02ada3181bc50

    SHA1

    3b77c4539ac45b0721d7853d487683368fb95b6f

    SHA256

    fcc881f0e04483796b22c59123e54c0f67afd1d86c640f5171ba0ac2ea06d4ed

    SHA512

    09b439bb3b3aed92796f91ae83bfd54c022b09c2ecc85ff3b60d0bbfe16d79394ef36408502d41b9831266920b996300ae5f3ab32b658c318a888439fba38752

  • memory/1404-0-0x0000000002580000-0x0000000002581000-memory.dmp

    Filesize

    4KB