Analysis

  • max time kernel
    78s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 11:04

General

  • Target

    da34244614c02e314b5611e8d4134c47_JaffaCakes118.exe

  • Size

    9.4MB

  • MD5

    da34244614c02e314b5611e8d4134c47

  • SHA1

    423b5e1db1212b236cdd8e54e01ad72e2a1ff3b8

  • SHA256

    938e5c4dad04b9a7944c4d4595d9f381d69376d62609570b790682de7f5191c4

  • SHA512

    5416e3c30fe0df76c7684100f2864ff9d2588362532ccb06c76749d4970ddfe32660f832b0588a1583ac15e1f4518aecba3ce727c77214f41b346c6f0389b91d

  • SSDEEP

    98304:Bz/smdkdNgaCsFEEEEEEEEEEEEEEEEEEEEEEEEEEEEMYEEEEEEEEEEEEEEEEEEEI:Bz0jduGD8g/pDGqks

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da34244614c02e314b5611e8d4134c47_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da34244614c02e314b5611e8d4134c47_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2440
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 2476
      2⤵
      • Program crash
      PID:3168
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2440 -ip 2440
    1⤵
      PID:4384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2440-0-0x0000000000400000-0x0000000000D60000-memory.dmp

      Filesize

      9.4MB

    • memory/2440-1-0x0000000002C10000-0x0000000002C11000-memory.dmp

      Filesize

      4KB

    • memory/2440-2-0x0000000002CB0000-0x0000000002CB1000-memory.dmp

      Filesize

      4KB

    • memory/2440-16-0x0000000000400000-0x0000000000D60000-memory.dmp

      Filesize

      9.4MB