Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 15:56

General

  • Target

    c114ef4840b7578bd20868843a27cae5_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    c114ef4840b7578bd20868843a27cae5

  • SHA1

    90eb6b129f0517f381f896e82fd2ae1aa24273ca

  • SHA256

    40d881ec8ff79021ee5466f2b20dfbc86cc18e455089dee7d7d068be559c7190

  • SHA512

    fe89330ce866535a73f0115d964812319be6e25b43cee8ee82e6d652262c3eeea9d126f498186a546ff88c9fce57248c21de032f22402ce2d12ad48541c080e5

  • SSDEEP

    1536:0songUqpmVH3Y9D/Uhy1jjxa6jKTvFPhwMl0aCdwAzgPVX+J:0Ap83Y9D/Uhy1j1a6jKDxNOdpg9OJ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c114ef4840b7578bd20868843a27cae5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c114ef4840b7578bd20868843a27cae5_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1432
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1028,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=4064 /prefetch:8
    1⤵
      PID:3464

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1432-2-0x0000000000400000-0x0000000000412A00-memory.dmp

            Filesize

            74KB

          • memory/1432-1-0x0000000000400000-0x000000000040D000-memory.dmp

            Filesize

            52KB

          • memory/1432-5-0x0000000000400000-0x0000000000412A00-memory.dmp

            Filesize

            74KB

          • memory/1432-4-0x0000000000400000-0x000000000040D000-memory.dmp

            Filesize

            52KB