Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 04:31

General

  • Target

    fff82d601bd3732d04302f10b40a9660_JaffaCakes118.exe

  • Size

    205KB

  • MD5

    fff82d601bd3732d04302f10b40a9660

  • SHA1

    081a65bf0a8cca3c9b4deb4d0affda13cc7eeb93

  • SHA256

    e8807b53cedaced63ab8aa4e1d0e91f0d0629b695259bbfc8d8b22c06fd474f6

  • SHA512

    7fd1f9517c45e5e8751fa22342c00dfc1d65e5d1b6275a1ff16ad082ff1e635d7397e30c6c3d69ff0bf9bedc6af503171e553cd70a3f72f6ce8a3868acb9817d

  • SSDEEP

    3072:O5sPGQe5sX6dehxxjq0Fp2XAdff3+Jg/P44xpflta2c935a4ZChBA5mn7PrV:PGtsDPOXAdff3CgzuYBAe7x

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 64 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fff82d601bd3732d04302f10b40a9660_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fff82d601bd3732d04302f10b40a9660_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.exe-

    Filesize

    749KB

    MD5

    cd858be6706183b1c8f7347be02ba0cc

    SHA1

    d952b726e80e6165aa27655330c41b3f8d5aab55

    SHA256

    cedfdf5c37c241c2586ad4e8a01c7692ed7bcd8de9f5402139876bb9d8797543

    SHA512

    5e633add3114d7a705481f35cf39d4a6c0e9f34e7b1a9583bcc37669baea51232589f11bef5fb9b9066991a460a334c3eac5bf559054948ca0d8408e5ad19c49

  • memory/1120-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1120-3049-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1120-3050-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1120-4244-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1120-4245-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1120-4250-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB