Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2024 12:21

General

  • Target

    de4ae6054b97fdcd2d89ac2798c8bdec_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    de4ae6054b97fdcd2d89ac2798c8bdec

  • SHA1

    229563e3f0407845a0d6dfcd2513f3b463c09287

  • SHA256

    48d772fbccda668662ae2bbbe235dc9dca52185ed8151e4b6580d198c7ce98e1

  • SHA512

    1941ea0fbf122b6a54cee0867f4d14ae924cbe0c00727cc8c9626c88113b8e177a51f949eb69214b3db97349000abd5a8529262fdffc176c69ddeb2459d7a6c7

  • SSDEEP

    3072:rljDE1x0GReaDs4arHlOVyNe1tFWArkdZg2R6ow++u85oy6Fz:rpDQsairQVyNe1RrEfpR4SN

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de4ae6054b97fdcd2d89ac2798c8bdec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\de4ae6054b97fdcd2d89ac2798c8bdec_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 92
      2⤵
      • Program crash
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2652-0-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB