Analysis

  • max time kernel
    135s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 15:43

General

  • Target

    f65552fe946a740a04f4826df6ac97d3_JaffaCakes118.exe

  • Size

    18KB

  • MD5

    f65552fe946a740a04f4826df6ac97d3

  • SHA1

    0b5fbe21fec2b050123029a689fd525a1ca2972d

  • SHA256

    fab768804497baa11ca4125b179044b7a0a3aa20a075a3956ba5b39ce1cfac9e

  • SHA512

    891c1d31953cb3b4c63a6be9ab74023243d023fe2d2c12115bd6987890333bf0ba3fc6dd50f8d02a9bb79dc02b86846a986999aea33f8a5a74054222d893d31f

  • SSDEEP

    384:FnALRnfbBz8wT2J/XlQhmXvZo7IBSiqmH6j:m1TmwTw/VQ8XvZY2BPH6j

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f65552fe946a740a04f4826df6ac97d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f65552fe946a740a04f4826df6ac97d3_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\b.bat "C:\Users\Admin\AppData\Local\Temp\f65552fe946a740a04f4826df6ac97d3_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\b.bat

          Filesize

          56B

          MD5

          53bfe5e56ee7fe6f911a69d63ec75bb0

          SHA1

          0749a7e178f0cf1bec7560adc3dffeafba8bcd59

          SHA256

          2393a34e810100dad1765d5f5d6e732a3288257381897fdbe2054de7044b7af6

          SHA512

          a3fb118e01a6b04695b8999cdaa2eae525604bef398945d31ebdc318d1b15b89fb61b4f15139f78651047a697247b496690077bef3657c1738575d83a10262e6