Analysis

  • max time kernel
    97s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 12:17

General

  • Target

    0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe

  • Size

    136KB

  • MD5

    0a9ebe4d50cd2f1ff0254509d6c4eaa0

  • SHA1

    ada0d38c6f03ec8b5d84851e4bee6dcd587fd937

  • SHA256

    522157df7fa767b44ffaf178af86c7eb37b4fca96a9d18912031e974794b0c86

  • SHA512

    c4f0b0d0cd1395f153a4f74cbb0b6951af46d3c97d30b1b26ae95cb554a590126cbab886af8185129d3e163bbe8ce9ddb98570a95768648ec44133d03b891beb

  • SSDEEP

    1536:DY+gJL9KHikLALc9aHQQbo5/YnuNqpK5TVF+b9bOpLMynIEe3vS7Gmx4qOqSai9v:LRbg2RauD5RF+b8LMMIEe/IG6zNSaix

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a9ebe4d50cd2f1ff0254509d6c4eaa0_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\240631359.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2660
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\240631484.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\240631359.bat

    Filesize

    99B

    MD5

    db6bdca3baf85d3fb83827d56de7b90c

    SHA1

    5fe326fe568da843f3c37f9b7538681372e096ce

    SHA256

    bd8545b14b11fc161a6508d0e95d8edda8d408de12661b6ff68b4127b2a6c9bd

    SHA512

    231a7d013fa92dfc568ec34b87b8e81c3aa98aa1d7107b7ccc87bb43ddc78e533bfa6855ed7b84c4688380d90983906a6981d5eff605ab15e1ab66903a767aab

  • C:\Windows\240631484.bat

    Filesize

    219B

    MD5

    81e7a0278bae79ff8f8d9ba4834ddaf9

    SHA1

    841110efc25a58c4ddf019d7a07624a07d336aa2

    SHA256

    d4a31bae5a40263a9e878175b0783b6e67858538293185daebb8f8599d09f033

    SHA512

    f0a7af4dab3aaa7341341e831fb86e474235f0eea816b3362642bfea956a7e6421fb7cc9e576da67f22f6f407f2006c4efa8a6c617e317eb2ca9513513badb0a

  • memory/4068-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB