Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 04:31

General

  • Target

    08e4f86ffd8080d4a43dee01063242c9_JaffaCakes118.exe

  • Size

    3.3MB

  • MD5

    08e4f86ffd8080d4a43dee01063242c9

  • SHA1

    b77010ef626d07a27a0647e714ad7ba6a885d71c

  • SHA256

    a60554292d194451715cb8d75907fd382b31564a2081d5abf05bef9e2a105f6b

  • SHA512

    0f5d4e019721d958a2071ef5ce51ceb74039a7398ff8a5a1d8085e865c861322c3f53d4a8d73996b5d15fee0223a48075885c932ea4387dafacde24ab9a66b8a

  • SSDEEP

    49152:GJvfupkhjzPNf31JagrpM26tM4JVm7iVG3jrLYnlvLYwuMJTFg26tMc:qeGh/F9oMpM2aVm2VG7CJLuM1Fg2O

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08e4f86ffd8080d4a43dee01063242c9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\08e4f86ffd8080d4a43dee01063242c9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Users\Admin\AppData\Local\Temp\08e4f86ffd8080d4a43dee01063242c9_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\08e4f86ffd8080d4a43dee01063242c9_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\08e4f86ffd8080d4a43dee01063242c9_JaffaCakes118.exe

    Filesize

    3.3MB

    MD5

    7704ba588d65b27c70daf7c07c1f409c

    SHA1

    d906790597fcb9e470c78f05914003b7c9c11875

    SHA256

    bf2597ed6fdfc88ca25d3d39a6081ceeb719ef866fa30b2fbf343b1cec71f47f

    SHA512

    c40f545ba18e65040e5129f126f9fcd9367d620d05175f5347af9e86c6509b873e693c1c1a3a8afb7e67c5cf52680a293d4a5911e195b32cad01ec7c47a03c7c

  • memory/1864-0-0x0000000000400000-0x0000000000877000-memory.dmp

    Filesize

    4.5MB

  • memory/1864-1-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/1864-4-0x0000000001AD0000-0x0000000001F47000-memory.dmp

    Filesize

    4.5MB

  • memory/1864-15-0x0000000003EF0000-0x0000000004367000-memory.dmp

    Filesize

    4.5MB

  • memory/1864-14-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2304-17-0x0000000000400000-0x0000000000877000-memory.dmp

    Filesize

    4.5MB

  • memory/2304-18-0x0000000000400000-0x000000000064D000-memory.dmp

    Filesize

    2.3MB

  • memory/2304-24-0x0000000000400000-0x0000000000640000-memory.dmp

    Filesize

    2.2MB

  • memory/2304-23-0x0000000001D00000-0x0000000002177000-memory.dmp

    Filesize

    4.5MB

  • memory/2304-30-0x00000000037C0000-0x0000000003A0D000-memory.dmp

    Filesize

    2.3MB

  • memory/2304-47-0x0000000000400000-0x0000000000877000-memory.dmp

    Filesize

    4.5MB