Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 00:42

General

  • Target

    db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    db83044597e2b12bd8cf9a12d4870cce

  • SHA1

    ead58ccb73af8b47bcdce50eb43525d3d5aea65e

  • SHA256

    9b3acae6a6738003aa758af3e6a7c17164fb8f97b83df395a06d74e642db6992

  • SHA512

    f61071eee3c48ac15769f8f850cb7eddf0dc47b9ca4a281cdc0af81b72bc5190099d01b126145d1a1ed0e5c7e3b33878d0a81b1d038372e44fa356db281cd8ea

  • SSDEEP

    24576:uUZVeIOWJRH814FaLwNAQUQjC05y37G9vH9XimKJY85iMUEIs7YuPCp7Bb/W/+lU:uUZgduRutLwOcjCD36f9XimKJYGtTap4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3396
      • C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4544

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe

            Filesize

            31KB

            MD5

            7efc387017221960ae741fb41186c3ed

            SHA1

            9e7ee2862559f0387b5995fce5a2c9819b9cdecf

            SHA256

            1dcbf21d4b5195c84e8776ef179c9d74c7f2f55fef3300ca841b634a722e3ede

            SHA512

            31845d75fb72514f59c637138af45d1adc6e7b1f5a02ecb86aa8c8d94f0c5cc47ccf1fd54522aa3e9d0293415a581252c394ce17d44b3044a5480f12af01e0ed

          • memory/3396-19-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

            Filesize

            4KB

          • memory/3396-18-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB

          • memory/4544-22-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB

          • memory/4544-17-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB

          • memory/4544-16-0x0000000000400000-0x0000000000408960-memory.dmp

            Filesize

            34KB

          • memory/4804-5-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB

          • memory/4804-6-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB

          • memory/4804-8-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB

          • memory/4804-13-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB

          • memory/4804-11-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB

          • memory/4804-7-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB

          • memory/4804-4-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB

          • memory/4804-0-0x0000000001001000-0x0000000001003000-memory.dmp

            Filesize

            8KB

          • memory/4804-3-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB

          • memory/4804-1-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB

          • memory/4804-2-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB

          • memory/4804-23-0x0000000001000000-0x000000000113F000-memory.dmp

            Filesize

            1.2MB