Analysis

  • max time kernel
    139s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 16:10

General

  • Target

    bc6d9e140d23e41f22bde943db4a8c2a_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    bc6d9e140d23e41f22bde943db4a8c2a

  • SHA1

    ff90c731e2e2dd304b0a8569a7e9caab2cb132e2

  • SHA256

    2266b220e50b6597fdd3e325c57e158716d1b6840834291f3c31e96b9725e5cc

  • SHA512

    31a299410fa23f3b294aab1dbf0c9918da18fe07c337925a8848b45478f91993cc5d21f7c43b8d3ea337b04dd972c1b35e65fde03ce7b1c87e6253df15ec9008

  • SSDEEP

    3072:ZwGS7yobBxvSneIz3nh6KM+50fhdUEU9f1g+aOEarHzThnq4ckSnjXyr54/x:SxyzQKM+AdU5nCWlqeSnW50x

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc6d9e140d23e41f22bde943db4a8c2a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc6d9e140d23e41f22bde943db4a8c2a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Users\Admin\AppData\Local\Temp\bc6d9e140d23e41f22bde943db4a8c2a_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4736-2-0x0000000001000000-0x000000000101F000-memory.dmp

    Filesize

    124KB

  • memory/4736-4-0x0000000001000000-0x000000000101F000-memory.dmp

    Filesize

    124KB

  • memory/4736-5-0x0000000001000000-0x000000000101F000-memory.dmp

    Filesize

    124KB

  • memory/4736-6-0x0000000001000000-0x000000000101F000-memory.dmp

    Filesize

    124KB