Analysis

  • max time kernel
    94s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 23:31

General

  • Target

    b97e4f60fc8948d3bb0299413aa1a3de_JaffaCakes118.exe

  • Size

    77KB

  • MD5

    b97e4f60fc8948d3bb0299413aa1a3de

  • SHA1

    1ed394f6ca3f8dbc58ea8ff79e0af167d2ea96d5

  • SHA256

    5b55dc27d3123b57ff7cf00c2ddaffb3f08e17e30c4390438b1399fd862ced69

  • SHA512

    63d86fca2afe1970b0197725b29e6edd7b9b6c101cd929607e158e7350e0b488b1dddadd7b4113357b2a76af2ebab4d9ae609d782e5703f832748dfdbbbbd7f1

  • SSDEEP

    1536:Wjl+2lHKITkBXkHbo/8kbrcJj6XWLaKK0Fs8DVRO+h+:O5HKITkBXkHbo/8kbgj6XWLaKNzDVph+

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b97e4f60fc8948d3bb0299413aa1a3de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b97e4f60fc8948d3bb0299413aa1a3de_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:4312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.exe-

    Filesize

    622KB

    MD5

    e03cd60202bc6aa9d529dce0828320e0

    SHA1

    ca206e1c9ded76ae29e58a14ead2b366e167685e

    SHA256

    165ca64740d0c6046c1e00deed08b66887580c010d769b4da5920ede95828691

    SHA512

    a2090230b3324435efcc844a90ef782d6b4304ba6780c755fba433c71f3e2ac496e800d97c050e2629b28e7dae09b6823a03e6ea2a7f76d8869d2ed45cc510bf

  • memory/4312-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4312-2985-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4312-2987-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4312-4249-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4312-4250-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4312-4254-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB