Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:38

General

  • Target

    0849af5fa82561ee78849046dffce92e_JaffaCakes118.exe

  • Size

    636KB

  • MD5

    0849af5fa82561ee78849046dffce92e

  • SHA1

    4866b452b42517bd4b1617eec0536e75d0fee1ca

  • SHA256

    ad2d7f6b27a58978d05ea8343db01aa02c29fdc39b57a90dd35dfc33e2b408d7

  • SHA512

    ff79266eedd331e303d6d14add34df95229993d44e85d9a9fb2b4148b2fae5f5981717775a8254e253e62c25b09583206c421cc96475a55c31c8248b341e9af5

  • SSDEEP

    12288:Dp+LLr7YmNkEp3gos8uXY4cO/gqhd+3C5+qQUjJUU4QdxIYDdtWnI+NKnw/L1:9qP7nkEp3W8AD/Dhd+y4lqJ8QdCYDoD5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0849af5fa82561ee78849046dffce92e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0849af5fa82561ee78849046dffce92e_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4956
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x33c 0x2fc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4956-0-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-1-0x0000000000610000-0x0000000000613000-memory.dmp

    Filesize

    12KB

  • memory/4956-2-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-3-0x0000000000610000-0x0000000000613000-memory.dmp

    Filesize

    12KB

  • memory/4956-4-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-5-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-6-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-7-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-8-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-9-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-10-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-11-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-12-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-13-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-14-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-15-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-16-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4956-17-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB