Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 07:12

General

  • Target

    ead35dedf745cd88735f2ddbee2d7d81_JaffaCakes118.exe

  • Size

    64KB

  • MD5

    ead35dedf745cd88735f2ddbee2d7d81

  • SHA1

    7db7d447d9fa43fe54d3e26e190417cff58a7d4c

  • SHA256

    1bd016bd993e201d709fe4898eeef2c76fe19c2b63d90e7c4f97929290f857a0

  • SHA512

    dc577f8f13c4d38e4cd034d244f8e2b7772cbf398ee9371556bfb033b270ca7b404531714eefd506b9342a4cb87774943dc94ac12235bc00263b4a9d38a46026

  • SSDEEP

    1536:KZBoWdHaDL1UOUcA1unifKUYJFB6LakIqV:KUWdHaDhocDGKU4fkIqV

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ead35dedf745cd88735f2ddbee2d7d81_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ead35dedf745cd88735f2ddbee2d7d81_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt65126.bat "C:\Users\Admin\AppData\Local\Temp\ead35dedf745cd88735f2ddbee2d7d81_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bt65126.bat

    Filesize

    698B

    MD5

    4681b6235d72a6723785522c85e7a4f7

    SHA1

    7588e677fb73991d03a7d0c06588f2ccd7e4f822

    SHA256

    f0a095ca2b0c00fac1d06d262fd15bb8f0565bcfde7216929a980f96981f190e

    SHA512

    65a3cf6aebffc4e206221fa915dfc0de976c41aa902c04b304f714b1df7a314c1a129870d89c165bf917fbe0e40ed881dd84d040f4accb152ef157567573aaf9

  • memory/2120-3-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB