Analysis

  • max time kernel
    91s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 03:32

General

  • Target

    ffdfd283cbeb46003ece9b39a7fbe29b_JaffaCakes118.exe

  • Size

    189KB

  • MD5

    ffdfd283cbeb46003ece9b39a7fbe29b

  • SHA1

    3123d9f1d14f57155d426c82471a29db76a86e69

  • SHA256

    427ac06af1b5d673307d0985c6deeb39c020ed143ab905858aab1f421a368a87

  • SHA512

    67821c04815a9da8e9a1100dd953a02157d4de3a97b05cea17142fd0df8076f7a9a2a2a3671eba20b77025c335994884f39309439caab91f30d0ea0a23d5c8d8

  • SSDEEP

    3072:SUCRrb3xnRXqu1WeXj04/9ube0+nA6tU4d/:SUCRrb3pWeT0xjwU4p

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 7 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3380
      • C:\Users\Admin\AppData\Local\Temp\ffdfd283cbeb46003ece9b39a7fbe29b_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\ffdfd283cbeb46003ece9b39a7fbe29b_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Users\Admin\AppData\Local\Temp\ffdfd283cbeb46003ece9b39a7fbe29b_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\ffdfd283cbeb46003ece9b39a7fbe29b_JaffaCakes118.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3048
          • C:\Users\Admin\AppData\Local\Temp\ffdfd283cbeb46003ece9b39a7fbe29b_JaffaCakes118.exe
            C:\Users\Admin\AppData\Local\Temp\ffdfd283cbeb46003ece9b39a7fbe29b_JaffaCakes118.exe
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4412

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3048-23-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3048-3-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3048-6-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3048-8-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3380-26-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

            Filesize

            4KB

          • memory/3380-25-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB

          • memory/4412-17-0x0000000000400000-0x0000000000408960-memory.dmp

            Filesize

            34KB

          • memory/4412-19-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4412-14-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4412-20-0x0000000000400000-0x0000000000408960-memory.dmp

            Filesize

            34KB

          • memory/4412-15-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4412-29-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4464-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4464-11-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB