Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 19:20

General

  • Target

    0c236a1e340cee3da62f17907bb36843_JaffaCakes118.exe

  • Size

    108KB

  • MD5

    0c236a1e340cee3da62f17907bb36843

  • SHA1

    db25eeaa3df0ba662e89199374542a2b2cead2a2

  • SHA256

    ce8b05f7e5605d6f18aa51d673e4e51c3754d5497c6f43f3596f97b6a0c3be76

  • SHA512

    4a8d8521bee61858911b066cebd202149230d265b3c1b364ab270cf51e424ce38555d5c77510ccd9ebcae8b679ec9a7921bdd595bb72121a5acbdaed01151d5a

  • SSDEEP

    1536:W0vfyXrFIZ7Jiul4OvzxEfI2agmmQ7pU2s5sVdzmh:W0XyMJ3txEQbgcsCD

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c236a1e340cee3da62f17907bb36843_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0c236a1e340cee3da62f17907bb36843_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Tnf..bat" > nul 2> nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Tnf..bat

    Filesize

    238B

    MD5

    8435b873ab07073ec9868114c6374d8b

    SHA1

    7e2df1476a4a8cd76b6287a05191cbac3eaf8f05

    SHA256

    5717f5b00fcea24d7f6079904b2a40af47c0d2d678f16f2ed216ae41665dfb4c

    SHA512

    defd47a12f3e53284d89fc85d98822a2d810b352277157e2a3d2d8ce67ce03cc6c2d5687dba52be03b41c500fca10a638b245133b1240855a6bdb7c0024cadf0

  • memory/2280-0-0x0000000000220000-0x0000000000235000-memory.dmp

    Filesize

    84KB

  • memory/2280-1-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2280-4-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB