Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 15:49

General

  • Target

    b412912b369f557f10d7854fa2ce34e0_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    b412912b369f557f10d7854fa2ce34e0

  • SHA1

    74507857bcb94a1dd8522918b8cc5fafeedcf4b7

  • SHA256

    9679b70546e0ad8aa94b0dcfb2420f2601099e8acaecbf66830af7a9e1157f1c

  • SHA512

    e5ef11c118ca501771d73bb1a78666b6b244583b3817cce7ac3f1f85a061a746b1e4788f4ae0b592e0e4df4bfc4461f89d40b5618f94a91bc63af09d0b0cb07e

  • SSDEEP

    24576:gceqvXIPVKHoUGnUmJ5v3uAk5h3RXgROfWZuGf5kulf3ZM5v0TYTOSd3B1k:gceqvXItnAs5mAwSROfW0w5ks3ZM5cTV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b412912b369f557f10d7854fa2ce34e0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b412912b369f557f10d7854fa2ce34e0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MBX@5F4@25217F8.###

    Filesize

    2KB

    MD5

    622fdf33feb0b8865aa43d2a7bbb86fe

    SHA1

    de1e33716f32ca74fa2ae6e6155eb60cb6b3d874

    SHA256

    5c9626a8b2eec3b7b8dc1839a14d826c25a7f3acc8cd8d5f9783481db1dbd94f

    SHA512

    f0b288e3e46f9316282f24a1674644bfd3d172abfad88e629e35671a6fe174233de59067d2a658a2bcbab6916d98f1b890738f326eaacf8ec21c642fabf0582f

  • memory/1524-0-0x0000000000400000-0x00000000006DD000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-10-0x00000000024A0000-0x00000000024F9000-memory.dmp

    Filesize

    356KB

  • memory/1524-11-0x00000000024A0000-0x00000000024F9000-memory.dmp

    Filesize

    356KB

  • memory/1524-9-0x00000000024A0000-0x00000000024F9000-memory.dmp

    Filesize

    356KB

  • memory/1524-7-0x00000000024A0000-0x00000000024F9000-memory.dmp

    Filesize

    356KB

  • memory/1524-12-0x00000000027A0000-0x00000000027A1000-memory.dmp

    Filesize

    4KB

  • memory/1524-8-0x00000000024A0000-0x00000000024F9000-memory.dmp

    Filesize

    356KB

  • memory/1524-24-0x0000000000400000-0x00000000006DD000-memory.dmp

    Filesize

    2.9MB

  • memory/1524-27-0x00000000027A0000-0x00000000027A1000-memory.dmp

    Filesize

    4KB

  • memory/1524-26-0x00000000024A0000-0x00000000024F9000-memory.dmp

    Filesize

    356KB