Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 13:23

General

  • Target

    beadc46c4d21bf9119ae16eaadd68f24_JaffaCakes118.exe

  • Size

    6.7MB

  • MD5

    beadc46c4d21bf9119ae16eaadd68f24

  • SHA1

    358c8323b7cb102cd774b1d78f0f383c58b707af

  • SHA256

    37d96cda23823b306b73b95f9074c89f4561024a8dde4a115d0f3f7c14b53905

  • SHA512

    3372947283be364a44b043d43b0ec2d614f9456b67038a7fd1da0dabdb4d18e54e4834f53a9df2c9fce3db298183e51c6c87f079407702d2b0e6f9bce788af59

  • SSDEEP

    196608:cDohLaXtsUEYVloMpcjDmDUCop8ZHvsUjub30Mn/gYnhiy5G:ckhetWYPoMejLCjZHkUjgU

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beadc46c4d21bf9119ae16eaadd68f24_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\beadc46c4d21bf9119ae16eaadd68f24_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\PC1Data\settings.txt

    Filesize

    36B

    MD5

    e5b5eae7149cdc2ad738ee30a46f5f4a

    SHA1

    13386047f1f530c6af0c8c0420adde0dc72fa3be

    SHA256

    2e560dcc1cea37bd290de29cb0417e593a81555a64c21c996a655d79b01665b9

    SHA512

    5580b082c689869a2f0ef7a0fe7c7029ea5a49c89fc924569125eb6dbf4e5cbb6e386698934afc566f82a1d2752fd67602b1bf30683edf415e9d16a9ba5031f7

  • memory/3832-0-0x00000000006E0000-0x00000000012CE000-memory.dmp

    Filesize

    11.9MB

  • memory/3832-7-0x00000000006E0000-0x00000000012CE000-memory.dmp

    Filesize

    11.9MB