Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 07:39

General

  • Target

    b29f9d48e5b46064ca394254cb2cd2db_JaffaCakes118.exe

  • Size

    899KB

  • MD5

    b29f9d48e5b46064ca394254cb2cd2db

  • SHA1

    d5b09d160fef67bb4819679d707d01e87f828cb9

  • SHA256

    f4eeedec032fad90297cfbdbd09d7d9f4a57fd26d1499827a5f01a4a9791eb20

  • SHA512

    6e4944f30f034d6f58111bd1a2da27c8e8bb00eef524007f27de86cec2ce7dc26dc093651c6f462929f2e47c15c4632a68f8e0ed156ffa32a0d0ef95870e0b3a

  • SSDEEP

    24576:i76u29oxWg4H9RapGGWX/A4SDsvw5f3ksXbXgU:iyGxt4H9HtZQf3JXsU

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b29f9d48e5b46064ca394254cb2cd2db_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b29f9d48e5b46064ca394254cb2cd2db_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Local\Temp\b29f9d48e5b46064ca394254cb2cd2db_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\b29f9d48e5b46064ca394254cb2cd2db_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2280-0-0x0000000073F9E000-0x0000000073F9F000-memory.dmp

          Filesize

          4KB

        • memory/2280-1-0x00000000010E0000-0x00000000011C8000-memory.dmp

          Filesize

          928KB

        • memory/2280-2-0x00000000002F0000-0x00000000002F6000-memory.dmp

          Filesize

          24KB

        • memory/2280-4-0x0000000073F90000-0x000000007467E000-memory.dmp

          Filesize

          6.9MB

        • memory/2280-11-0x0000000073F90000-0x000000007467E000-memory.dmp

          Filesize

          6.9MB

        • memory/2540-7-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2540-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2540-13-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2540-10-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2540-3-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2540-17-0x0000000073F90000-0x000000007467E000-memory.dmp

          Filesize

          6.9MB

        • memory/2540-16-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2540-18-0x0000000073F90000-0x000000007467E000-memory.dmp

          Filesize

          6.9MB

        • memory/2540-5-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2540-6-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2540-19-0x0000000000760000-0x0000000000798000-memory.dmp

          Filesize

          224KB

        • memory/2540-20-0x0000000073F90000-0x000000007467E000-memory.dmp

          Filesize

          6.9MB