Analysis

  • max time kernel
    141s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 17:04

General

  • Target

    bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe

  • Size

    530KB

  • MD5

    bc955fe35a6a4e850c3cefaf160809b9

  • SHA1

    0237e2021699ef2e1871c64494310db79689ca6f

  • SHA256

    84405200bc407218b6cc9313a7591eba8a3653629043550bab9d82321728a565

  • SHA512

    1ca933f2070dc4e56d73964363b7d552c652339716b079985e97778fa2a42a55ebf808ed81f16aaafb9babd2bd58d818b7a660a4e04394561acf619212d99f87

  • SSDEEP

    12288:55QPTJvuVhV2vVc1pJPBO7Pc5wjhubpWQiHc/oM5ebMeCNG0NtTirdJ:552TU3V2vVc1XP8lj1Qi8/k1CNPTEdJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Users\Admin\AppData\Local\Temp\bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\bc955fe35a6a4e850c3cefaf160809b9_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Users\Admin\AppData\Local\Temp\AdobeSFX.log
        C:\Users\Admin\AppData\Local\Temp\\AdobeSFX.log
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 520
          4⤵
          • Program crash
          PID:2752
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3940 -ip 3940
    1⤵
      PID:3664
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:8
      1⤵
        PID:224

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\AdobeSFX.log

        Filesize

        879KB

        MD5

        4fb2e76328c3b7514dc479893537667d

        SHA1

        3c3edad82d14a0dd4aa8ebb9a97f19194fd82519

        SHA256

        436bfa7c3d703f55336f0c2304597047e8af3e60fe1e8b00b66df46ff402a753

        SHA512

        a2a6fe2fe54cc1bf6892f3f7b639ceb4ea5ba1dfd57994ddeba254995cdbb928e815cb3e1257ac0a06a0b43c0f33a2d9225e4c4176424ea21856ba88c523c913

      • memory/3372-4-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3940-16-0x0000000002C90000-0x0000000002C91000-memory.dmp

        Filesize

        4KB

      • memory/3940-15-0x00000000012D0000-0x0000000001313000-memory.dmp

        Filesize

        268KB

      • memory/3940-13-0x0000000001330000-0x0000000001331000-memory.dmp

        Filesize

        4KB

      • memory/3940-19-0x0000000001360000-0x0000000001361000-memory.dmp

        Filesize

        4KB

      • memory/3940-18-0x0000000002CC0000-0x0000000002CC1000-memory.dmp

        Filesize

        4KB

      • memory/3940-17-0x0000000002CD0000-0x0000000002CD3000-memory.dmp

        Filesize

        12KB

      • memory/3940-20-0x0000000000400000-0x0000000000D76000-memory.dmp

        Filesize

        9.5MB

      • memory/3940-14-0x0000000002C50000-0x0000000002C51000-memory.dmp

        Filesize

        4KB

      • memory/3940-12-0x0000000002C20000-0x0000000002C21000-memory.dmp

        Filesize

        4KB

      • memory/3940-11-0x0000000002C30000-0x0000000002C31000-memory.dmp

        Filesize

        4KB

      • memory/3940-10-0x0000000002C40000-0x0000000002C41000-memory.dmp

        Filesize

        4KB

      • memory/3940-9-0x00000000012C0000-0x00000000012C1000-memory.dmp

        Filesize

        4KB

      • memory/3940-8-0x0000000001320000-0x0000000001321000-memory.dmp

        Filesize

        4KB

      • memory/3940-7-0x0000000002C70000-0x0000000002C71000-memory.dmp

        Filesize

        4KB

      • memory/3940-6-0x0000000000400000-0x0000000000D76000-memory.dmp

        Filesize

        9.5MB

      • memory/4776-3-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB