Analysis

  • max time kernel
    94s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 20:12

General

  • Target

    d05f047cb3322fc36b619783f558061f_JaffaCakes118.exe

  • Size

    109KB

  • MD5

    d05f047cb3322fc36b619783f558061f

  • SHA1

    08ff68ef68ed069e7a4ea3f94361454da86ee5c7

  • SHA256

    c93ab3d12ec501186da540ff00a919fa54eb26a6c36bbea679875557199cc3b0

  • SHA512

    bd1b8de3b0c16e108970eb3ec6ec4ad2932812cc975343e60a894dafa976bf1440bcf79353f4fa37db899bd2d91f5646b51870447800b76488f2ac835370a79c

  • SSDEEP

    3072:Bnj9PtfUKINndIc0Jj5lax4g+Nag+LqBPzyfo/TOODVgywp8QP:Bjnei9uLq1zy0Soiz

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3400
      • C:\Users\Admin\AppData\Local\Temp\d05f047cb3322fc36b619783f558061f_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\d05f047cb3322fc36b619783f558061f_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3660
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\samia-05.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\samia-05.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\samia-05.exe
            "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\samia-05.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\samia-05.exe

      Filesize

      61KB

      MD5

      72187ebeeb5777db307da07de53fee75

      SHA1

      2b3b7903e57f5c487f6f9d3b27bdf585475a92d1

      SHA256

      a31f8eeed0c13b37d651c38b9983a5f834495dfec04fff4654dd1dfba6d97fff

      SHA512

      2dba9e31defd0b406fb377214009b50681866569e588890efe655cd3c766b972de13d0b8852d182bc85fd684071eb705e95a6947a7a015cd8f99bae266ebc2d6

    • memory/3400-9-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3400-10-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB

    • memory/4780-6-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4780-7-0x0000000000400000-0x0000000000B64000-memory.dmp

      Filesize

      7.4MB

    • memory/4780-8-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4780-14-0x0000000000400000-0x0000000000B64000-memory.dmp

      Filesize

      7.4MB