Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 03:19

General

  • Target

    ba27048849359bc992cbc5870f1b5d1f_JaffaCakes118.exe

  • Size

    562KB

  • MD5

    ba27048849359bc992cbc5870f1b5d1f

  • SHA1

    824258293b4d50f5d07735b8c0435bd4caee8520

  • SHA256

    3fede8286d6106a1456d67ebb5369a661d4520a6db1a235b8933a824d14b1b8a

  • SHA512

    f77664a6fc5a4d95496adabaedf8c7bca3c37f975489c0d492fc672cf67e901a78cbb850b1131369ae3564c42d0d461c4ab2337ce54629cb5c1ff046be71b763

  • SSDEEP

    12288:8t6up80MFXURnW8U9hJF3Z4mxxrDqVTVOCv:E6uq03W8U9hJQmXiVTzv

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba27048849359bc992cbc5870f1b5d1f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ba27048849359bc992cbc5870f1b5d1f_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a58163$$.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\$$a58163$$.bat

          Filesize

          152B

          MD5

          cbb89d88f983097ad3d447d86784a321

          SHA1

          71ad3da39eb96e8c85dbafc282b2a68844428033

          SHA256

          68f308882eec5c631e6a1c772b6fc60f0e90ca81c439216db13280d537cdb6d5

          SHA512

          51deccc4984921573303dbce7311904003a8edc0a28a1ac96abe727fe239043fa592bcd31870e08048395a415889123e8a29d275da37d68b99ea4664c6fab881

        • memory/744-4-0x00000000023B0000-0x00000000023B1000-memory.dmp

          Filesize

          4KB

        • memory/744-2-0x0000000002380000-0x0000000002381000-memory.dmp

          Filesize

          4KB

        • memory/744-11-0x0000000003330000-0x0000000003331000-memory.dmp

          Filesize

          4KB

        • memory/744-10-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

          Filesize

          4KB

        • memory/744-9-0x00000000023C0000-0x00000000023C1000-memory.dmp

          Filesize

          4KB

        • memory/744-8-0x0000000002390000-0x0000000002391000-memory.dmp

          Filesize

          4KB

        • memory/744-7-0x00000000023A0000-0x00000000023A1000-memory.dmp

          Filesize

          4KB

        • memory/744-6-0x0000000000A80000-0x0000000000A81000-memory.dmp

          Filesize

          4KB

        • memory/744-5-0x0000000000A90000-0x0000000000A91000-memory.dmp

          Filesize

          4KB

        • memory/744-14-0x0000000003370000-0x0000000003470000-memory.dmp

          Filesize

          1024KB

        • memory/744-12-0x0000000003320000-0x0000000003322000-memory.dmp

          Filesize

          8KB

        • memory/744-3-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

          Filesize

          4KB

        • memory/744-0-0x0000000000400000-0x00000000004E4000-memory.dmp

          Filesize

          912KB

        • memory/744-19-0x0000000000400000-0x00000000004E4000-memory.dmp

          Filesize

          912KB

        • memory/744-22-0x00000000009B0000-0x0000000000A04000-memory.dmp

          Filesize

          336KB

        • memory/744-21-0x0000000003370000-0x0000000003470000-memory.dmp

          Filesize

          1024KB

        • memory/744-20-0x0000000003370000-0x0000000003470000-memory.dmp

          Filesize

          1024KB

        • memory/744-18-0x0000000003370000-0x0000000003470000-memory.dmp

          Filesize

          1024KB

        • memory/744-1-0x00000000009B0000-0x0000000000A04000-memory.dmp

          Filesize

          336KB

        • memory/744-17-0x0000000003370000-0x0000000003470000-memory.dmp

          Filesize

          1024KB

        • memory/744-24-0x0000000003370000-0x0000000003470000-memory.dmp

          Filesize

          1024KB

        • memory/744-25-0x0000000003370000-0x0000000003470000-memory.dmp

          Filesize

          1024KB