Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 04:18

General

  • Target

    b213a194d4a436cc4aa3ba9c8edbc427_JaffaCakes118.exe

  • Size

    22KB

  • MD5

    b213a194d4a436cc4aa3ba9c8edbc427

  • SHA1

    6eaf9c96e4f19a920e3aca7593ed51ee824e5eac

  • SHA256

    917c13129c5f845cbbdc05058c1d7330d295b2a432a0ab4a07526f122580e8fc

  • SHA512

    1b25d75c2c848c41a29d954419105631e7c4e37561823dd5884bd29ded0243deb4a1c082fecb659e1d67b2d0be6a6877f7e708c6f265c39af0d2ec16c1b4cfc9

  • SSDEEP

    384:H6CR32xPAGB7ibLK+2z4gLs4lDpqe/2V9PMb5UhrrjE0Er5+PFWA:H6CRGxhB7ULKiOs4lDX+Qb6hj2YAA

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b213a194d4a436cc4aa3ba9c8edbc427_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b213a194d4a436cc4aa3ba9c8edbc427_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 196
      2⤵
      • Program crash
      PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2116-0-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2116-1-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB