Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 16:12

General

  • Target

    b42360f024ac2e717c7fc2449dce1be0_JaffaCakes118.exe

  • Size

    446KB

  • MD5

    b42360f024ac2e717c7fc2449dce1be0

  • SHA1

    bddd42bf2b912f9d402fc38788cdece7cfa6b647

  • SHA256

    ed7dff76700389fd26829032175285b3cc61e9aefe1a79f5710c6bdc8685eabd

  • SHA512

    da21f12630581ec86d3f758c2fef4070fc640a9499e68da096f73c14d8fd4b7070b538e21ec7c40deb3a0dd003d7043d8e529e391127f61c094791737aa0e4fa

  • SSDEEP

    6144:iyH7xOc6H5c6HcT66vlmgHIetsKVLyJS70mXEe2SAscLcbsMuJMvmcXEcZ5iIyuG:iatIasG+o0eY7YGAZ5lJxYFV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b42360f024ac2e717c7fc2449dce1be0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b42360f024ac2e717c7fc2449dce1be0_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\b42360f024ac2e717c7fc2449dce1be0_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Users\Admin\AppData\Local\Temp\b42360f024ac2e717c7fc2449dce1be0_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\b42360f024ac2e717c7fc2449dce1be0_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3292
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b42360f024ac2e717c7fc2449dce1be0_JaffaCakes118.exe

    Filesize

    411KB

    MD5

    2dfcb2393528446aeb9fb861a8fc39ab

    SHA1

    6289061a6bf4047097cd0a2fff7b3aaf470d834f

    SHA256

    b5ab4a80fb81904f5655c1365e1bbacc490d7e179fe3361177111df35d225827

    SHA512

    0adbad97faa21dc7dcb403508ceef48e62647af169c2813001dadbba80dfd4e896c45bcdbc8bc006e431c3badcedd6ea243b244a7e0bb2c88311951aef15bb36

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    0ede982dd41527ae83699bf8f9e40932

    SHA1

    0391f24b2ca11e1f139593c2b4c1b2d18daae629

    SHA256

    cbe5279950f34507b9f91e61642e9dfa03ff2fb567dabb6b2303d79cce3d2b44

    SHA512

    4dd7f9ceed29b6d7d12396bee37381215caa39615954a1ea8f9b9262dd4fdfd3f20ff86928146242092d94e1f6466a9b2800623f3d4aee35e03e86215c7656f1

  • memory/1624-2-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2272-10-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2468-13-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2468-14-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2468-18-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2468-19-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2468-23-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB