Analysis

  • max time kernel
    150s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:22

General

  • Target

    083b315b61405053b6431e91f25ba4fb_JaffaCakes118.exe

  • Size

    117KB

  • MD5

    083b315b61405053b6431e91f25ba4fb

  • SHA1

    423ecbeb7402129d34ba7abd39a45ff51882d721

  • SHA256

    39ce77765b5120f1b53faebb740d2725903f9551a6868532be717cc5a235bcd4

  • SHA512

    1d7fe3e525b3e30cd59e7189cb0060750bf9bf66326d7f51b2e8409da199d535044592dee4a57e137697359b0839894716bfa708d94f5270c64b8b98381c3e48

  • SSDEEP

    3072:Qxvmpm2yKept6op+s+5fTRaqym0WkJificeFaL:IKep1Iss4qGR0fipFa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\083b315b61405053b6431e91f25ba4fb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\083b315b61405053b6431e91f25ba4fb_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\Cfumea.exe
      C:\Windows\Cfumea.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:4828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Cfumea.exe

    Filesize

    117KB

    MD5

    083b315b61405053b6431e91f25ba4fb

    SHA1

    423ecbeb7402129d34ba7abd39a45ff51882d721

    SHA256

    39ce77765b5120f1b53faebb740d2725903f9551a6868532be717cc5a235bcd4

    SHA512

    1d7fe3e525b3e30cd59e7189cb0060750bf9bf66326d7f51b2e8409da199d535044592dee4a57e137697359b0839894716bfa708d94f5270c64b8b98381c3e48

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    390B

    MD5

    beee761368a6620a789d1da0dea32a5f

    SHA1

    6cac0b5b2a3c1dc8090c2b808a40ddbd1cd71bc3

    SHA256

    5374442d7bfe22bbc5f8463182b49eec8c9910b26bb5b27b661207d6477e2ca2

    SHA512

    17ea18de6eb0b4cd7a77745c47799791754cea9da0b8957b1f32262122ed4db5742d1d90d12a9a2a7d14d8b9605e36bce8dbba408c9992a33c74d78cd3c57312

  • memory/1612-34082-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1612-1-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1612-0-0x00000000005E0000-0x00000000005F4000-memory.dmp

    Filesize

    80KB

  • memory/1612-91198-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4828-8-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4828-34050-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4828-9-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4828-91199-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4828-91201-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4828-91202-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4828-91204-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4828-91208-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB