Analysis

  • max time kernel
    138s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 16:02

General

  • Target

    b41be2ad467aee515e9223457d616b4b_JaffaCakes118.exe

  • Size

    85KB

  • MD5

    b41be2ad467aee515e9223457d616b4b

  • SHA1

    ad2d4bf5e5f574de1aa8725e0bfb275b48228860

  • SHA256

    9847f8a5dcffe85ca88be47872d1235da56e0989d66a7f8d9141cc61783f9816

  • SHA512

    7630f75c359965ed662deea72a0d8d1788635002f88508cd4380414c990f57e0f79ce9b39125f28cc6c3ac6ca0032837c5d2bdf1e88b938582fff0c914c5833b

  • SSDEEP

    1536:Wjl+2lHKITkBXkHbo/8kbrcJj6XWLuFm6yECw0qjW9SRnkgFflnLX:O5HKITkBXkHbo/8kbgj6XWLuFTyDeSSd

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b41be2ad467aee515e9223457d616b4b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b41be2ad467aee515e9223457d616b4b_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.exe-

    Filesize

    630KB

    MD5

    ce29c26378e8b4f7ff45ec80c5313b6c

    SHA1

    5d5f3ea1929d7240bb23a8a123281bbc5721d879

    SHA256

    9ce8aafade319c93d42229c91958fde0e92731292f46444e3159b1600673e79b

    SHA512

    39976cc1b1959ab0e16e64bb130a20b82ded9b9285e0a697d3e7d3b13a1c5e31c1f0b3d4de24368fc135093097cbbb358d558c39def7ae51a851cdce5fb29ad6

  • memory/408-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/408-1983-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/408-1981-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/408-4244-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/408-4245-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/408-4249-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB