Analysis

  • max time kernel
    94s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 07:47

General

  • Target

    e8a40967631226e79b19ca90453f650a_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    e8a40967631226e79b19ca90453f650a

  • SHA1

    ca44ab814595e712a6f5cf5c75cf6bd760b48424

  • SHA256

    c41915364b83c7a7c972bd23c5a640761f4bc740f0d2cfc499cf7a9d2e9eb60a

  • SHA512

    7e10a87277b962a2c7ecd6271dc628c04cd7cc451927ea926870e2f8c8abd4a54456ee3bef5a6a63cd75929549b786d4eb868900abd23240aa8addf92e26cb48

  • SSDEEP

    24576:F1KezP3jzMNhV+68GN5Oeo4W/3G+B0n8Nl3yvKMqUFy921AdG3m6NAUwC+hmv0o:bKerzz4hV+tGjj+eCMfo2FW6NADhmF

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8a40967631226e79b19ca90453f650a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8a40967631226e79b19ca90453f650a_JaffaCakes118.exe"
    1⤵
    • Identifies Wine through registry keys
    • System Location Discovery: System Language Discovery
    PID:4172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4172-0-0x0000000010000000-0x000000001019D000-memory.dmp

    Filesize

    1.6MB

  • memory/4172-1-0x00000000006F0000-0x00000000006F1000-memory.dmp

    Filesize

    4KB

  • memory/4172-2-0x00000000022B0000-0x0000000002414000-memory.dmp

    Filesize

    1.4MB

  • memory/4172-3-0x0000000010000000-0x000000001019D000-memory.dmp

    Filesize

    1.6MB

  • memory/4172-4-0x00000000006F0000-0x00000000006F1000-memory.dmp

    Filesize

    4KB