Analysis

  • max time kernel
    11s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 14:00

General

  • Target

    fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe

  • Size

    69KB

  • MD5

    fa89415a44271b6f7ebd078243b2fc97

  • SHA1

    946c8e18fcebdd004a3c9ad491dec389dc3ea77f

  • SHA256

    25b7ebfaa0f6b84a0131ed4e526696193b344341d5c53982eeb9040d06aff33b

  • SHA512

    6bd30c2bb2f38dc112bd62493efeeb0fe8ec497215965083f2b847307501b894112cbde32803d1d9e9c8251cfb9c4ec9fed5b3e3bcf70c5f1f4df60e227478df

  • SSDEEP

    1536:QYhN+JA33e8kzKV+dMKgk2WkX7kUUYsZuGqq+p:Qa+JA3OFKV+i3Wky5uGkp

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa89415a44271b6f7ebd078243b2fc97_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Evj..bat" > nul 2> nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2756

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Evj..bat

          Filesize

          238B

          MD5

          0397386a9949080f07d85a7758ec2ec8

          SHA1

          fa576486babaf664b15e7549968bf4b9c3b6df0c

          SHA256

          f0c564d54efc85ef1e4905ccf7d444ef3e3ff0282f1c5d16f63f93353b2ec93c

          SHA512

          39a08f0803433f57bb0ce48a051aaa13b7a7b069da05fca7fb0cf2d98fe672c78fbb0c773c418536c1f30738bab6bb005eaf8d9617c80cd2e134c361c3c4b9fe

        • memory/2088-0-0x0000000000240000-0x000000000025C000-memory.dmp

          Filesize

          112KB

        • memory/2088-1-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2088-2-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2088-4-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB