Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 02:41

General

  • Target

    d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe

  • Size

    977KB

  • MD5

    d358b84a8f0a32cf18b381e0c742d5ce

  • SHA1

    4cd803db44f520fefaf126c0173da90b7b4917ce

  • SHA256

    8b4e75273b80e80c8da0b961babd27d1e357d7f3710330de71e0c846ed51dae7

  • SHA512

    227f13f1d57bbaa1f4d8b6f583d9c743c4aa2726aa24b88d20157bbf0c0f15a50f892f155dd943c383eac3f15d38702e15b00688f71f8326482ef37f0ef02a73

  • SSDEEP

    24576:SAHnh+eWsN3skA4RV1Hom2KXMmHaM5B3wl5:Vh+ZkldoPK8YaML3G

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe"
      2⤵
        PID:3028
      • C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe"
        2⤵
          PID:3040
        • C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe"
          2⤵
            PID:3068
          • C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe"
            2⤵
              PID:2196
            • C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe"
              2⤵
                PID:1244
              • C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe
                "C:\Users\Admin\AppData\Local\Temp\d358b84a8f0a32cf18b381e0c742d5ce_JaffaCakes118.exe"
                2⤵
                  PID:1128
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 460
                  2⤵
                  • Program crash
                  PID:2708

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/2696-0-0x0000000000120000-0x0000000000121000-memory.dmp

                Filesize

                4KB