Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 10:52

General

  • Target

    b75b202f58c24e5192ea9c2a51664055_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    b75b202f58c24e5192ea9c2a51664055

  • SHA1

    24d5516681a49bf7211112dba5ebc938abf778c6

  • SHA256

    340ad9d0ee03e8d7e093e24bce057aa489870bb21f9de12febbd79bb74088ca3

  • SHA512

    96b0dacddd6bb5dfaed52559fb33623df69cace3111ae44a29094abe7c6187a41198ffc68be0940e938c684574c2dfb374c39d457e1b2543c82403c4f1e0212b

  • SSDEEP

    192:Xa9v+ENBe98TojcxJKfNENzzfzlqg9JjdhMxdUINU5bxRrGR55Uhac+P9t4BuI:0+zpMKElf5l9/ubzNQkv3P9tI

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b75b202f58c24e5192ea9c2a51664055_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b75b202f58c24e5192ea9c2a51664055_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\wcm.exe
      C:\Users\Admin\AppData\Local\Temp\wcm.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\wcm.exe

    Filesize

    7KB

    MD5

    89bb579e606d297cdc3c310f85e83ce7

    SHA1

    b49cb2d41e33cc43282b1d5a2835fc45c0575ec9

    SHA256

    0797330ad3c6a6029fcf4d9e16530588c3dcb02882849c14c92fcb3124042345

    SHA512

    6cd316876ddf1235a18e6fd1a8a1c193763e29737ade14823c206ce44aed02a298eb7924d62c4f866c1282d48b89bc5eb0bb050bf7f2364ef6d50afa8e89be7f

  • memory/2304-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2304-6-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB