Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 05:48

General

  • Target

    ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe

  • Size

    50KB

  • MD5

    ae14db66cd71b6ba57b07a509f9258da

  • SHA1

    5fcedd3993f8e5004aa68067fe52b7e9b614ca0e

  • SHA256

    029bab9aa5f01fe00cb221a516f1764e7f1b8e72d98208fcaa8750dd92bb2abd

  • SHA512

    baf20614ffb33665ecf04514d47fb3eb009718bf41f4e2d9dc4261b7c4c53dea2a40b3a9f512b634cc77deea9663056228ea2fb9b10abce75ac932205a1e4261

  • SSDEEP

    768:LepHpvCRuviPuvvaVeRMFhMN/L+9n53W+oof/Xox/FEA:qpHpvs5wvaVeR0aVL+qLuoP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ae14db66cd71b6ba57b07a509f9258da_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    50KB

    MD5

    77776b356b275759a4517fa8a9e468d8

    SHA1

    a1b584755a0f77a023e5c716f44cadaca60ce19d

    SHA256

    861903a77529c0f9ff109eb40bd1c9972e14f30ad23ea4386bcca5cdb60e7c99

    SHA512

    296bb17b4b8952cdbea8f452fcdae5d9d0b9276ccaf518703f0b42874ccd4aaeae6184ad7222b02a80651ed5c52336a9a90a75cef3c21d0a65b80d2f182893f5

  • memory/2116-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2116-1-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2116-4-0x00000000034B0000-0x00000000038B0000-memory.dmp

    Filesize

    4.0MB

  • memory/2116-11-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2116-9-0x0000000003980000-0x000000000398C000-memory.dmp

    Filesize

    48KB

  • memory/2528-10-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2528-14-0x0000000003300000-0x0000000003700000-memory.dmp

    Filesize

    4.0MB

  • memory/2528-13-0x0000000002610000-0x0000000002611000-memory.dmp

    Filesize

    4KB

  • memory/2528-15-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB