Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 17:29

General

  • Target

    f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe

  • Size

    59KB

  • MD5

    f04bc8930d3222ea8c5503c29d0d1bfc

  • SHA1

    7d1f9f1b7a6dcd62a32f2d97dc6818e862851c76

  • SHA256

    d8dfa84f191497422ce2dee5f785d57bef6fe9b61897d89a5c0cc567ba4d7c33

  • SHA512

    7b6b779ff2173bf961311cc2dc1c076c660228cc46594a21126c19faef2e4847675a18e1e14997cd9113d8e4043dcf1465e4b0de63cef8488f22734dab27edde

  • SSDEEP

    1536:c9wvQUreUbyzABq2e5khOBY/tc4S5zUv2:MA/yzv2e5kgBYm4iwv2

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DDB2.bat "C:\Users\Admin\AppData\Local\Temp\f04bc8930d3222ea8c5503c29d0d1bfc_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1868

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~DDB2.bat

          Filesize

          3KB

          MD5

          fc7bb485ebc5ed2b40ada16f49bf7ff4

          SHA1

          7a40de737758939524c04dc1c17bafbb35a1b9b6

          SHA256

          476503ac5a76715f9b1dc81f6d5824522b13c870573563fb685a967a16bd105f

          SHA512

          ca592f7f44c1211ca0757bb9b6772dc5d3f6c293e67f66e3178a555d4ebeb285df21fa5fe3f0c6db3a235e1502915f42fa63cc7921e5f7a106b1366116b8c7be

        • memory/2128-3-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB