Analysis

  • max time kernel
    92s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 20:36

General

  • Target

    fade7af5573f9cedc4b279ae37a77dcb_JaffaCakes118.exe

  • Size

    26KB

  • MD5

    fade7af5573f9cedc4b279ae37a77dcb

  • SHA1

    99c47f1726cd43b5dbdaeefdc772f25df8850ff6

  • SHA256

    e928cc1f267701d6cc5c07c767eebd29a9ec6da9c7960e14d7b0082385bf885e

  • SHA512

    513c9de2a6e24253a8225f4dc4d88df1e26ccb36003cf0e4e1270cc375f3215c5caeaf607c6596b6ab35025b7dae131ae3d4fed396a6247dfcf6ae294f809549

  • SSDEEP

    384:lfmLVVi5T9GqQSk7Ya+vyGEDs6EzpRVw2Xt5iaRLTQh1uiGZrPwb:lfSi50qDuYa+KlUi2dAKTQCiGpwb

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fade7af5573f9cedc4b279ae37a77dcb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fade7af5573f9cedc4b279ae37a77dcb_JaffaCakes118.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
        PID:1868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4856-0-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/4856-2-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB