Analysis

  • max time kernel
    125s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 01:10

General

  • Target

    083180b430d08a32dffd524142d547c0_JaffaCakes118.exe

  • Size

    818KB

  • MD5

    083180b430d08a32dffd524142d547c0

  • SHA1

    f3d92419d342679bdd8a8de0b84a9698800d3307

  • SHA256

    0e2ec0f71714a83d755ea866e6cfb3e9945914cb673ac47556ff58beda77b292

  • SHA512

    9bbd07195793ccec2ab436b5316e29c59378e326eedc378beb62419b5553cbc58415440e2ca50f4ff6393cf15ed1016952ca286ae4ce6ea3903d388bbaf20047

  • SSDEEP

    12288:xsiJaSfxrGPKag1LTr4KFgtmnBT5BNq/Rm7CtBCm9Hcs6UUtFeq90jMV:xsWaMUVyLfBgtq3BemGtB5esTUjeq9hV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\083180b430d08a32dffd524142d547c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\083180b430d08a32dffd524142d547c0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:3476
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4112,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4056 /prefetch:8
    1⤵
      PID:2512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\GLC54F1.tmp

      Filesize

      157KB

      MD5

      fbd929bfc7b4a9e4fa4506655bab4c4a

      SHA1

      b4df84de80729a04ed90dc976a3e730a568f24f8

      SHA256

      adf8dea5d36b58cf621e2bb0c4549f94e0919308dd7cc1215d942417c45e54a4

      SHA512

      b310e79848dc2a3c6a4524e0b120e2e3dd73ecb6852c65a9eec368045f7bab0b141210726476dd3cb0c1d9008e1f34149f35c03a0156a9eef7d4a7fbc61ea1b4

    • C:\Users\Admin\AppData\Local\Temp\GLK5521.tmp

      Filesize

      30KB

      MD5

      3df61e5730883b2d338addd7acbe4bc4

      SHA1

      03166e6230231e7e3583cf9c8944f4967aa1bf1b

      SHA256

      2efe9a54c8eb878711d9b6cd18f276838645aff52fe69d8a864376cb258ec616

      SHA512

      36e9d705d22dad3d952b4da578a990f2b63ec2f9fbf2734efdaea9ecbd4f07a8d7232792eb5bdd81c553354d51334993cb6103c377f3483a680eac9e41cd2087