Analysis

  • max time kernel
    135s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-08-2024 14:00

General

  • Target

    af7fec7b8df6111dd430836665651bf5_JaffaCakes118.exe

  • Size

    21KB

  • MD5

    af7fec7b8df6111dd430836665651bf5

  • SHA1

    851e0b6faa0ff1e9ff34810f26f2593e399c6c75

  • SHA256

    7c42017b768589dcb0f9d69686125c51c0b523a99878544d04bab54247a83cdd

  • SHA512

    d8de6397e3e00736b80ce8fe2b724fcf85faa15ef10bccd7fa728f678901695818152dc3f252c445ec3e0f67f6ac80047c0ebbf33bf41ce76ef7453f1f57eb86

  • SSDEEP

    384:tZRdCyTMqlWSmQmpGos1rLENjckLePs5MZsBHeE5YnQWBae0AmoV:LCy4qlzmQAg3EWic+e3Ge03

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af7fec7b8df6111dd430836665651bf5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\af7fec7b8df6111dd430836665651bf5_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_deleteme.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_deleteme.bat

    Filesize

    212B

    MD5

    e27ed0d3131efb76e349b4adac033054

    SHA1

    878b5c65604466e2a21edede13480e057e81447e

    SHA256

    650446ed9874659e1de3df7cc9d2d87d05af09f8683fc055184aa7bfffdcd959

    SHA512

    d9cb74fe8ed5a023003d9a7224d6defce4d45177202d40d84f67e988bbeeab7406e801ee29cbe5587b6687c897712dd9f787ea3c2320a19002bb1c58f7004937

  • memory/4300-4-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB