Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 19:38

General

  • Target

    c97f2785f4b2e3a47b8e458f374f6c17_JaffaCakes118.exe

  • Size

    61KB

  • MD5

    c97f2785f4b2e3a47b8e458f374f6c17

  • SHA1

    e5ca86e275bb58072aea31858c9716128fe2d9b8

  • SHA256

    121b25e7d695196540df82a61514f381302db07d279de06301a436c6c2cb1c55

  • SHA512

    90debee0d0a869f7b50e49d8b8238a7a1ef34ff166aa271d962f3263fd45c3e340b33d346039b41d5a3fd634422fe71c0bc75c2cd743f43aa74807bec86d052e

  • SSDEEP

    768:D5LSZHa+EglU0U/HomcpFfZK7KCSSDaXdF+lF:FUT1/5pxZSSY+A3

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\c97f2785f4b2e3a47b8e458f374f6c17_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\c97f2785f4b2e3a47b8e458f374f6c17_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2160
        • C:\Users\Admin\AppData\Local\Temp\c97f2785f4b2e3a47b8e458f374f6c17_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\c97f2785f4b2e3a47b8e458f374f6c17_JaffaCakes118.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2260

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2160-0-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/2160-11-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/2260-5-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB

          • memory/2260-3-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB

          • memory/2260-1-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB

          • memory/2260-7-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB

          • memory/2260-9-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB

          • memory/2260-13-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB

          • memory/2260-14-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB