Analysis

  • max time kernel
    94s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 03:38

General

  • Target

    b1f755669f2b356afd1c3b7230d1a0a6_JaffaCakes118.exe

  • Size

    511KB

  • MD5

    b1f755669f2b356afd1c3b7230d1a0a6

  • SHA1

    7d8dece621e2abfd98a3c1c6017243d2db9360aa

  • SHA256

    9dbe4bc456cf031dbf49da1476c98a309f61e20ae022568bf34a6b26e07eb1cd

  • SHA512

    e679444aa71eb84d09aca57b264ec704e77d990edffa7929c0e3365777008f835004cae1a6bc2dc7184183eaab10ea24b65b5cef7a314cb648cecf02b2462926

  • SSDEEP

    12288:V4btHB8lSTm7P9Mew4b+OtUaZgVur3qU7iEKNWOeNceg:V4bwSTGMib+yUmgVur3qUWuOF

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1f755669f2b356afd1c3b7230d1a0a6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b1f755669f2b356afd1c3b7230d1a0a6_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Users\Admin\AppData\Local\Temp\b1f755669f2b356afd1c3b7230d1a0a6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\b1f755669f2b356afd1c3b7230d1a0a6_JaffaCakes118.exe
      2⤵
        PID:1100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 420
        2⤵
        • Program crash
        PID:4956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3492 -ip 3492
      1⤵
        PID:5020

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3492-0-0x0000000000400000-0x00000000004E5000-memory.dmp

              Filesize

              916KB

            • memory/3492-1-0x0000000000400000-0x00000000004E5000-memory.dmp

              Filesize

              916KB

            • memory/3492-2-0x0000000000400000-0x00000000004E5000-memory.dmp

              Filesize

              916KB