Analysis

  • max time kernel
    105s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 17:19

General

  • Target

    d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe

  • Size

    835KB

  • MD5

    d4e0768ec86d2f8d8b6a6b725bda4b87

  • SHA1

    4bd5d2c5c06e38cd70a18e4a99c16e0f1f841dee

  • SHA256

    09c8bb08807219149a78bfa1e239f5022e6eb2e802f87dffe87d0bcf16e483a8

  • SHA512

    f135e550defa90c4fc7d750628aae850405107998f6af9ebcb89b42ba26d3c977f37caff7c694db5617ada189872332dcc5175dd10d1c08e64cad7e3146a0f9e

  • SSDEEP

    24576:7iszFFV90kSaUdGAMVb32G6TVjuDsJ8BDeL+cLaA43DBDErHueXsS:1T

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d4e0768ec86d2f8d8b6a6b725bda4b87_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
      2⤵
        PID:3064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2332-0-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

      Filesize

      4KB

    • memory/2332-1-0x00000000005C0000-0x0000000000698000-memory.dmp

      Filesize

      864KB

    • memory/2332-2-0x0000000074D60000-0x0000000075510000-memory.dmp

      Filesize

      7.7MB

    • memory/2332-3-0x00000000050E0000-0x0000000005134000-memory.dmp

      Filesize

      336KB

    • memory/2332-4-0x0000000002A20000-0x0000000002A46000-memory.dmp

      Filesize

      152KB

    • memory/2332-32-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-58-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-56-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-55-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-59-0x00000000051F0000-0x000000000528C000-memory.dmp

      Filesize

      624KB

    • memory/2332-60-0x0000000074D60000-0x0000000075510000-memory.dmp

      Filesize

      7.7MB

    • memory/2332-62-0x0000000074D60000-0x0000000075510000-memory.dmp

      Filesize

      7.7MB

    • memory/2332-52-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-50-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-48-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-46-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-44-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-42-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-40-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-38-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-36-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-34-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-30-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-28-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-26-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-24-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-22-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-18-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-16-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-14-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-12-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-10-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-6-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-5-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-20-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB

    • memory/2332-8-0x0000000002A20000-0x0000000002A3F000-memory.dmp

      Filesize

      124KB