Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:11

General

  • Target

    eabc2c2f0d59c474c95f244a275c7bca_JaffaCakes118.exe

  • Size

    86KB

  • MD5

    eabc2c2f0d59c474c95f244a275c7bca

  • SHA1

    491510ec5819e65e8158cc4c7cf96ca7921ecb15

  • SHA256

    c5106d0e817d8df23c44bd3398919d7dd11825f4034fb18f96c257b865b42af8

  • SHA512

    29dde861dbefc9e8d37943ad7195f93e606a8a2c510c5c334a657ea25b2c10fb1fb5572138ecae0fbd7a24e4d0649ce8bc4f5ad004961702c9af769594246a42

  • SSDEEP

    1536:6MKDz6eSTfB1qSk+WUtdElpYbKlIezrmwmKJk0MbCaR7cN4iE7nZ7QNZOiaMoySy:6MSz6xfBK+nukbKXzrmuJgDg41kZWMoI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eabc2c2f0d59c474c95f244a275c7bca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eabc2c2f0d59c474c95f244a275c7bca_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4912-0-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/4912-2-0x00000000001E0000-0x00000000001F2000-memory.dmp

      Filesize

      72KB

    • memory/4912-4-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/4912-5-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/4912-6-0x0000000000790000-0x000000000079E000-memory.dmp

      Filesize

      56KB