Analysis

  • max time kernel
    95s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 20:37

General

  • Target

    f6d00fedf69b08c66b1afe87d7bfb524_JaffaCakes118.exe

  • Size

    292KB

  • MD5

    f6d00fedf69b08c66b1afe87d7bfb524

  • SHA1

    6b6e69a563e98aaf7a0622bb64fb297388733b7b

  • SHA256

    f266741655937e50afa79ff961be469aa16d2027be44a92c9b09b6e372c0d154

  • SHA512

    559ef011732b971f9df5aa68b3c6bce7fd636988806cfe7812b9bb3e1322a572e14489b1e16da07ae87b51c57d4aa1fc7578cc74e66559b524bd64e2cd83e7d4

  • SSDEEP

    6144:xYR9mkexYKi5Q80JWX+tm08i+wfg+AQukBcbB1hqng:Tkeji5T2jm0gwf/Pd+V1heg

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6d00fedf69b08c66b1afe87d7bfb524_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6d00fedf69b08c66b1afe87d7bfb524_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:4576
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 460
      2⤵
      • Program crash
      PID:3328
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4576 -ip 4576
    1⤵
      PID:1920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\xinstall3162400.dll

      Filesize

      211KB

      MD5

      588576bb384d431e281b6f628e76c5f4

      SHA1

      872a20b4a9a2f2ee6aa55f4dbfb19d3f03db82d6

      SHA256

      fbd29b1e5ca8690fecdef4d18b8e7126a7988fdcc379673141156c16f0f6233e

      SHA512

      dc8aaf11436f02d2ab583238a122532890bcb3e7769343aaafab0372f89b2fd15e3191378b2f5c39b4b1b0be6ae6c4780147d56c6bc817061d2ebb3ff9313b59

    • memory/4576-6-0x0000000010000000-0x0000000010036000-memory.dmp

      Filesize

      216KB