Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 20:24

General

  • Target

    bd07b09edc485fabf42c6f3047a9c8e8_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    bd07b09edc485fabf42c6f3047a9c8e8

  • SHA1

    b6633927f21f87a9b8b33308fe569c09c03f0be2

  • SHA256

    c24d470435d66e1458c74ca5f3cdccec581a5fda748ee6626828b8807a5fbbf1

  • SHA512

    5b195bfc4b29ca8a02d1a955d1264abeb2d1bb326f769531027aa55e12bbf979eac70790933a9bb04bb6d4fa60a4df86f7516c700fae09676b3e3ac5fc38614f

  • SSDEEP

    24576:JlVCxwY7ft+y6rXkS/MBICxziccG1o62nNZ/m3tUNx57rd0B7FaqVGPv0qEE6pjl:JlMw6tL6fSJ

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd07b09edc485fabf42c6f3047a9c8e8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bd07b09edc485fabf42c6f3047a9c8e8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Users\Admin\AppData\Local\Temp\bd07b09edc485fabf42c6f3047a9c8e8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\bd07b09edc485fabf42c6f3047a9c8e8_JaffaCakes118.exe
      2⤵
        PID:1640
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 192
        2⤵
        • Program crash
        PID:2028

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1640-2-0x0000000000400000-0x0000000000450000-memory.dmp

            Filesize

            320KB

          • memory/1640-4-0x0000000000400000-0x0000000000450000-memory.dmp

            Filesize

            320KB

          • memory/1640-14-0x0000000000400000-0x0000000000450000-memory.dmp

            Filesize

            320KB

          • memory/1640-10-0x0000000000400000-0x0000000000450000-memory.dmp

            Filesize

            320KB

          • memory/1640-8-0x0000000000400000-0x0000000000450000-memory.dmp

            Filesize

            320KB

          • memory/1640-6-0x0000000000400000-0x0000000000450000-memory.dmp

            Filesize

            320KB

          • memory/1640-12-0x0000000000400000-0x0000000000450000-memory.dmp

            Filesize

            320KB