Analysis

  • max time kernel
    90s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 23:03

General

  • Target

    dd34402764a4f20641bbdf696c25aa7f_JaffaCakes118.exe

  • Size

    103KB

  • MD5

    dd34402764a4f20641bbdf696c25aa7f

  • SHA1

    c59169feea9f0ef08025b43f70d80acf9a56a265

  • SHA256

    73d7deeaddd5b8f4f501f95cd0503088aee23e7b764ed272265acf40b892c246

  • SHA512

    25e510b6f98928e7ee88c0b57c87a571ad044cbaa2d33ee12f855efe72b093067353dacf73d917e6f8cdffeaa3160bcdbd2c9c46d56100ca21f6927a7a42988e

  • SSDEEP

    3072:t5+XZoq8GD12FWJg6nN8DXdivQHNXvSD6QWZhrM0T:tMIYjv8QpWZi0T

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd34402764a4f20641bbdf696c25aa7f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dd34402764a4f20641bbdf696c25aa7f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Users\Admin\AppData\Local\Temp\dd34402764a4f20641bbdf696c25aa7f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\dd34402764a4f20641bbdf696c25aa7f_JaffaCakes118.exe"
      2⤵
        PID:2216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2216-7-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2216-3-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2216-11-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2216-24-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2216-9-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2216-15-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2216-19-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2216-22-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2216-5-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2216-21-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2216-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2464-0-0x0000000000400000-0x0000000000432200-memory.dmp

      Filesize

      200KB

    • memory/2464-17-0x0000000000400000-0x0000000000432200-memory.dmp

      Filesize

      200KB

    • memory/2464-18-0x0000000000400000-0x0000000000432200-memory.dmp

      Filesize

      200KB