Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 15:59

General

  • Target

    edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe

  • Size

    3.2MB

  • MD5

    edf0a3c05c3d37ea794153d51022524b

  • SHA1

    821ec3c1e69ebe493f810660958bfe97f48b6d12

  • SHA256

    1d82737a80016f0c598b58be9842a834b39c1f21a31d3a4882202d44275a3afb

  • SHA512

    be2c697706274d4fb1eaa755263c7a04412763a1f3d1ce1b216f8fd7f61e3973456bf056af3a43db898dae2a7dba1a7b5da85687fab9e84a2879380bca60e32e

  • SSDEEP

    24576:vjx1BlBdVF7WfWYKjl32hUnXHjA3h3qeVF9NLqnCQ9YzfuI1M3zJTaYG0rP/2jzZ:vv7PYrU3MRrX9NLA9YN1M7G0e4/YfT

Score
7/10

Malware Config

Signatures

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
        PID:1688
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        2⤵
          PID:3076
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 276
            3⤵
            • Program crash
            PID:4720
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 3076 -ip 3076
        1⤵
          PID:1696

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3076-3-0x0000000000400000-0x0000000000532000-memory.dmp

          Filesize

          1.2MB

        • memory/3076-4-0x0000000000400000-0x0000000000532000-memory.dmp

          Filesize

          1.2MB

        • memory/3076-5-0x0000000000400000-0x0000000000532000-memory.dmp

          Filesize

          1.2MB

        • memory/3728-0-0x0000000074E72000-0x0000000074E73000-memory.dmp

          Filesize

          4KB

        • memory/3728-1-0x0000000074E70000-0x0000000075421000-memory.dmp

          Filesize

          5.7MB

        • memory/3728-2-0x0000000074E70000-0x0000000075421000-memory.dmp

          Filesize

          5.7MB

        • memory/3728-7-0x0000000074E70000-0x0000000075421000-memory.dmp

          Filesize

          5.7MB