Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 03:43

General

  • Target

    e1a3815002650fae545dc509e6379927_JaffaCakes118.exe

  • Size

    8.3MB

  • MD5

    e1a3815002650fae545dc509e6379927

  • SHA1

    cfe79246c5da05afc32e3099528cea0f8eeb324a

  • SHA256

    2b796bb5c6a16d5497ec15d17bc6935ac80697a52809fec119c0504d060d17ff

  • SHA512

    58b179cb606e80baf9cafd2b68de13a8923eba9be920dcb70a615c04726ee1fafb3f57839ca3f1d3409bd6985bb34d1ef65c508bb9acd361955a41e90f475fa9

  • SSDEEP

    98304:EcKeYe1eLy1eLYeYe1eLy16LNe1eLy16GeYe1eL71u:Em

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1a3815002650fae545dc509e6379927_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e1a3815002650fae545dc509e6379927_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Users\Admin\AppData\Local\Temp\sx.exe
      C:\Users\Admin\AppData\Local\Temp\sx.exe -run C:\Users\Admin\AppData\Local\Temp\e1a3815002650fae545dc509e6379927_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:5072

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\sx.exe

          Filesize

          13.3MB

          MD5

          624e897cd2a30b5caf466ae1ed2d7c66

          SHA1

          052c15287fe2dd3f4608016158ede96bb168e8de

          SHA256

          21d323f9c5a59dd06b7c976ee0acfe45753dba1c36b2544b6d362bb2696773a2

          SHA512

          ff6283e1eab18824bdb7ef22625a053f44e8027f44c23b6b3d6313e142481a04275d881c52070afe8937232ed50115a09c0985deba6e0a36652f8756feddb2e1

        • memory/3160-27-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-40-0x00000000025C0000-0x00000000025C1000-memory.dmp

          Filesize

          4KB

        • memory/3160-8-0x0000000002460000-0x0000000002461000-memory.dmp

          Filesize

          4KB

        • memory/3160-7-0x0000000000820000-0x0000000000821000-memory.dmp

          Filesize

          4KB

        • memory/3160-6-0x00000000007F0000-0x00000000007F1000-memory.dmp

          Filesize

          4KB

        • memory/3160-5-0x0000000000830000-0x0000000000831000-memory.dmp

          Filesize

          4KB

        • memory/3160-4-0x0000000000800000-0x0000000000801000-memory.dmp

          Filesize

          4KB

        • memory/3160-3-0x0000000000810000-0x0000000000811000-memory.dmp

          Filesize

          4KB

        • memory/3160-2-0x0000000002450000-0x0000000002451000-memory.dmp

          Filesize

          4KB

        • memory/3160-26-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-0-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/3160-39-0x00000000025B0000-0x00000000025B1000-memory.dmp

          Filesize

          4KB

        • memory/3160-38-0x0000000002590000-0x0000000002591000-memory.dmp

          Filesize

          4KB

        • memory/3160-37-0x0000000002560000-0x0000000002561000-memory.dmp

          Filesize

          4KB

        • memory/3160-36-0x00000000025A0000-0x00000000025A1000-memory.dmp

          Filesize

          4KB

        • memory/3160-35-0x0000000002570000-0x0000000002571000-memory.dmp

          Filesize

          4KB

        • memory/3160-34-0x0000000002580000-0x0000000002581000-memory.dmp

          Filesize

          4KB

        • memory/3160-33-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-32-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-31-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-30-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-29-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-9-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-28-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-14-0x0000000002510000-0x0000000002511000-memory.dmp

          Filesize

          4KB

        • memory/3160-25-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-24-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-23-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-22-0x0000000002D50000-0x0000000002D51000-memory.dmp

          Filesize

          4KB

        • memory/3160-21-0x0000000002530000-0x0000000002531000-memory.dmp

          Filesize

          4KB

        • memory/3160-20-0x0000000002520000-0x0000000002521000-memory.dmp

          Filesize

          4KB

        • memory/3160-19-0x00000000024D0000-0x00000000024D1000-memory.dmp

          Filesize

          4KB

        • memory/3160-18-0x00000000024A0000-0x00000000024A1000-memory.dmp

          Filesize

          4KB

        • memory/3160-17-0x00000000024E0000-0x00000000024E1000-memory.dmp

          Filesize

          4KB

        • memory/3160-16-0x00000000024B0000-0x00000000024B1000-memory.dmp

          Filesize

          4KB

        • memory/3160-15-0x00000000024C0000-0x00000000024C1000-memory.dmp

          Filesize

          4KB

        • memory/3160-13-0x0000000002D50000-0x0000000002D51000-memory.dmp

          Filesize

          4KB

        • memory/3160-12-0x0000000002D50000-0x0000000002D51000-memory.dmp

          Filesize

          4KB

        • memory/3160-11-0x0000000000850000-0x0000000000851000-memory.dmp

          Filesize

          4KB

        • memory/3160-10-0x0000000002D60000-0x0000000002D61000-memory.dmp

          Filesize

          4KB

        • memory/3160-41-0x0000000002D40000-0x0000000002D46000-memory.dmp

          Filesize

          24KB

        • memory/3160-43-0x00000000007E0000-0x00000000007E1000-memory.dmp

          Filesize

          4KB

        • memory/3160-42-0x00000000007D0000-0x00000000007D1000-memory.dmp

          Filesize

          4KB

        • memory/3160-1-0x0000000002300000-0x0000000002350000-memory.dmp

          Filesize

          320KB

        • memory/3160-50-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/3160-51-0x0000000002300000-0x0000000002350000-memory.dmp

          Filesize

          320KB

        • memory/5072-48-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/5072-53-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB