Analysis

  • max time kernel
    84s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 10:40

General

  • Target

    c08ec26180f6bd76752fa9644d2a9411_JaffaCakes118.exe

  • Size

    328KB

  • MD5

    c08ec26180f6bd76752fa9644d2a9411

  • SHA1

    a1d02d49e3430abeb410a5f3c99eb770b9c84ec4

  • SHA256

    a93d37d807c251926fb2581b861afb4a0bfcc32bdf5009216b539546cd82a17b

  • SHA512

    cf43070154a0077279d3044abf92c84cb47912e5a11a75e48554d88d6431ceefc0eb8f385d4a834df6cda854e3e41c3ff0970bafc48edf2e1051de9f5062b845

  • SSDEEP

    6144:0IHC2F8NXC796TB9vj48a5G/rvyQpW37sZTOurgdemVDZhZoyXhhf0ng:51eVQkTrvj47G/Dy4ZTONZUyMng

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\c08ec26180f6bd76752fa9644d2a9411_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\c08ec26180f6bd76752fa9644d2a9411_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1852
        • C:\Users\Admin\AppData\Local\Temp\c08ec26180f6bd76752fa9644d2a9411_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\c08ec26180f6bd76752fa9644d2a9411_JaffaCakes118.exe
          3⤵
            PID:336
          • C:\Users\Admin\AppData\Local\Temp\c08ec26180f6bd76752fa9644d2a9411_JaffaCakes118.exe
            C:\Users\Admin\AppData\Local\Temp\c08ec26180f6bd76752fa9644d2a9411_JaffaCakes118.exe
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4660

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1852-18-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/1852-10-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/1852-11-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/1852-12-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/1852-9-0x0000000076200000-0x0000000076201000-memory.dmp

        Filesize

        4KB

      • memory/1852-13-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/1852-14-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/1852-15-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/1852-17-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/1852-16-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/1852-24-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/1852-0-0x0000000000460000-0x000000000049A000-memory.dmp

        Filesize

        232KB

      • memory/3488-26-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

        Filesize

        28KB

      • memory/3488-27-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

        Filesize

        4KB

      • memory/4660-19-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/4660-21-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/4660-22-0x0000000000400000-0x0000000000408960-memory.dmp

        Filesize

        34KB

      • memory/4660-25-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB

      • memory/4660-30-0x0000000000400000-0x0000000000408960-memory.dmp

        Filesize

        34KB

      • memory/4660-31-0x00000000761E0000-0x00000000762D0000-memory.dmp

        Filesize

        960KB