Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 02:06

General

  • Target

    b5ef7da8073ba987e4b4e23644e9407d_JaffaCakes118.exe

  • Size

    103KB

  • MD5

    b5ef7da8073ba987e4b4e23644e9407d

  • SHA1

    324e0914ce83c3c18a4bf3f95221b60cd7d19c84

  • SHA256

    c536ce17d0fad31426a59d67fe718d97299784affa8721de9d0d850dcb2aec57

  • SHA512

    b7e7a005ae4fe20a73a7a08d2dd6bdb560d37b9a4e2768fe3438c30a6562356c31045efe05f025d82204b4a2598100e668532affd047d350de02a3b6a66d38be

  • SSDEEP

    1536:GneWR3yiWHr3Dx4u1Z9h5zl01Fb8F7Cauh/arz5foU/j3YPiRDno6Z7EJg6:GeQ3yiy9T5zl01ZiC/hiXFz/jIeo3J

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5ef7da8073ba987e4b4e23644e9407d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b5ef7da8073ba987e4b4e23644e9407d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:4448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3608-0-0x0000000002330000-0x0000000002332000-memory.dmp

      Filesize

      8KB

    • memory/3608-1-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/3608-2-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/3608-3-0x0000000002370000-0x000000000237E000-memory.dmp

      Filesize

      56KB