Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 04:13

General

  • Target

    08d48de6f0ba3891697672b72b529af9_JaffaCakes118.exe

  • Size

    122KB

  • MD5

    08d48de6f0ba3891697672b72b529af9

  • SHA1

    1651232f3a869eb1d23737bafd188e9ec9d660f1

  • SHA256

    1ad1bc1f59e4a42aaa0deabf944b5df484f6a8bb6638f7bdc252c63253b8639f

  • SHA512

    99afee691bc9e8daaa8587b960a10086622c850345ea50a82357b874ea87662486c42f7ba63dd1280671a8ff5722425e1481a03a99d2b88d7e0fc208ee9cd8cd

  • SSDEEP

    3072:avWt3famc/ao98JhN1nJMY55P7bPfCXVxJ6Sm8:kW1oaO8JvpJMuNbPfCXVx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08d48de6f0ba3891697672b72b529af9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\08d48de6f0ba3891697672b72b529af9_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Dfj..bat" > nul 2> nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Dfj..bat

    Filesize

    238B

    MD5

    48b3919bd4685ba5325f403c1b5637e9

    SHA1

    196c97de696e921cbac3ea9fdc51f135f8ce94f1

    SHA256

    0ea27b66271bd15ba0d3ddffb9e3f74df3743b2fd267b988226fa59b87bdbd77

    SHA512

    f9e511ac75a41117032d876abe8a6ffb2560a3e465d65b19d13edb56aa2f3e5730ddf382092ff270bef75ce8da52609f24a37da81d1d980b43f827409b6cbaff

  • memory/1812-0-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1812-1-0x0000000000220000-0x0000000000229000-memory.dmp

    Filesize

    36KB

  • memory/1812-2-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1812-4-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1812-3-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1812-6-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB