Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:37

General

  • Target

    eac624ece6d32f74d83e53e729ebdfa1_JaffaCakes118.exe

  • Size

    705KB

  • MD5

    eac624ece6d32f74d83e53e729ebdfa1

  • SHA1

    0e3a351f8e49a0b76e52d7fdb80c35e58726b5ed

  • SHA256

    c553d197c71dc1dbcdf3c7cb33bdd30d27284bdfffd66dc5deaf57df456fdb0c

  • SHA512

    b2f3b0e3bf527428dd25bee824f48c87dee43d46dfdee0ed7ed22fec1841e3f7173816c5cdc97ed0359716dc0c30999c59d16c8dd56d4277364556afb84637bb

  • SSDEEP

    12288:5s1cOlv9M87nf/Ri8aV8IxtymWgNsWSMbhEzCiALJd9qhJnSmctXA:qVLM87f/R9U8pJgNsdMvULcQ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac624ece6d32f74d83e53e729ebdfa1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac624ece6d32f74d83e53e729ebdfa1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Java.exe
      "C:\Users\Admin\AppData\Local\Java.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:3848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Java.exe

    Filesize

    705KB

    MD5

    eac624ece6d32f74d83e53e729ebdfa1

    SHA1

    0e3a351f8e49a0b76e52d7fdb80c35e58726b5ed

    SHA256

    c553d197c71dc1dbcdf3c7cb33bdd30d27284bdfffd66dc5deaf57df456fdb0c

    SHA512

    b2f3b0e3bf527428dd25bee824f48c87dee43d46dfdee0ed7ed22fec1841e3f7173816c5cdc97ed0359716dc0c30999c59d16c8dd56d4277364556afb84637bb

  • memory/1484-23-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1484-0-0x00000000005A0000-0x00000000005A1000-memory.dmp

    Filesize

    4KB

  • memory/3848-9-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-30-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-4-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-28-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-26-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-24-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-54-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-14-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-21-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-19-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-17-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-8-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-10-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-3-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-56-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-15-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-52-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-50-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-48-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-46-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-55-0x0000000002100000-0x0000000002101000-memory.dmp

    Filesize

    4KB

  • memory/3848-44-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-42-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-40-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-38-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-36-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-34-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-32-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/3848-57-0x0000000002100000-0x0000000002101000-memory.dmp

    Filesize

    4KB

  • memory/3848-6-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB