Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 19:38

General

  • Target

    d2b0f2d801d41c8d5b90567b08c07298_JaffaCakes118.exe

  • Size

    108KB

  • MD5

    d2b0f2d801d41c8d5b90567b08c07298

  • SHA1

    d16a86fe9f197122d1d5da25158e1469892dc00b

  • SHA256

    59e8889d9847fb23f4062494a9f73a8ba772e39437f2751c8ea87ff6217255ca

  • SHA512

    8d6b52a49df739db4c3fbcf2d99e2f96cc1a119020e6387a27726e7d7899c02604e183863b6ed3c0e3b495ccef5dc890521d86fda5657b1082df3a2f9b7bf5b2

  • SSDEEP

    3072:KzNWMKKRZYchObK91C8sV6Xmoo4LEpYmHm1jyF:KZuuObR8sVImcyYmGU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2b0f2d801d41c8d5b90567b08c07298_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d2b0f2d801d41c8d5b90567b08c07298_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\virus 2.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\virus 2.bat

    Filesize

    3KB

    MD5

    dd583829457cb83407be1d15d5343643

    SHA1

    27da274b0f6cc848d5111666fc4d2d5d93dd1605

    SHA256

    0879736100e43cc8d9ebb1c7cd7830ea443759157a0781e4b21d3427cf31d66b

    SHA512

    a689f52a3ce3550187a485d3901555642734893947325427e0d18003cb0585c225347540b73161d61ae248acdce35cdf0d2ed4edf32cf505f649df0a24b7b7c3

  • memory/2480-10-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB