Analysis

  • max time kernel
    91s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 04:09

General

  • Target

    ea8f1971b6a6a7fd0d9378989cc6b6db_JaffaCakes118.exe

  • Size

    370KB

  • MD5

    ea8f1971b6a6a7fd0d9378989cc6b6db

  • SHA1

    935263c3d0ac8ed4bbb6f5806c55457d5cb39cee

  • SHA256

    2fb3d92e61fd34fbf3be7dea8bb6ae084e888e386c323daafdeb232436001fb8

  • SHA512

    16a08254c626d1eb35648b458dd31485db8edc98813f4a29b32c1a16f14cfe7bf3a739bcc034874e71635d445ee6691181799a66ca8430d3d1651392b7a6b8ca

  • SSDEEP

    3072:KLca+56U04jQVLD3v17k66sZ8me7qpDle03j00s6r2YWY9X5sxcFiC9c6JhYw:oFD/17kzsZ8me7qpDs0zn25o5jZvbh

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\ea8f1971b6a6a7fd0d9378989cc6b6db_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\ea8f1971b6a6a7fd0d9378989cc6b6db_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Users\Admin\AppData\Local\Temp\ea8f1971b6a6a7fd0d9378989cc6b6db_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\ea8f1971b6a6a7fd0d9378989cc6b6db_JaffaCakes118.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1676-2-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1676-5-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1676-4-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3424-7-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3424-8-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB