Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 03:58

General

  • Target

    0dce69f8f7a08fe4392ebf7c1b3433b7_JaffaCakes118.exe

  • Size

    712KB

  • MD5

    0dce69f8f7a08fe4392ebf7c1b3433b7

  • SHA1

    89edc36bb972bd101c1d3f3086317cb99e7a30f9

  • SHA256

    67d6ceb546460c62e80d6692320b2d47d266ab6682d51c43a7cf3d334a54f5a0

  • SHA512

    02d244a2b606545c2d8ad8304f02e63f906e10c9f0b24ff0e8d2f2fc6e77690a207431a679c9dc454281d65afee188b4c413f9ffb8b17be6b24618cb26572803

  • SSDEEP

    12288:fpamkOy/A87XKBtK5+oxqpnvqZExktE9wQJ2yy8lvsOqH2gOlh:fIfOyZqQlvy9wQQyH/gOL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dce69f8f7a08fe4392ebf7c1b3433b7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0dce69f8f7a08fe4392ebf7c1b3433b7_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3560
    • C:\Users\Admin\AppData\Local\Temp\StpAE22_TMP.EXE
      "C:\Users\Admin\AppData\Local\Temp\StpAE22_TMP.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Users\Admin\AppData\Local\Temp\is-KIACV.tmp\is-49JUF.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-KIACV.tmp\is-49JUF.tmp" /SL4 $601CE "C:\Users\Admin\AppData\Local\Temp\StpAE22_TMP.EXE" 443774 52224
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\StpAE22_TMP.EXE

    Filesize

    664KB

    MD5

    127b433fba029b7f26580fb31d5681fa

    SHA1

    d65f2256808589a6ec01124e637d8fb9514feb3f

    SHA256

    00163fafa9f5b5f81728c1a5b4d7c7210f766e039d00d61dcbf9798a47d4188f

    SHA512

    bcebbea9cb9afb5617c715141ca3b877d9309091a80e1f7edab92a08c6bbe1739d196ed7b7e7f54abd769933b60799053abd9c3f3d56d5aaeb1188be0de79507

  • C:\Users\Admin\AppData\Local\Temp\is-KIACV.tmp\is-49JUF.tmp

    Filesize

    656KB

    MD5

    4fa180886ff7c0fd86a65f760ede6318

    SHA1

    2c89c271c71531362e84ddab5d3028f0756a9281

    SHA256

    1d9026c60374b056720cdfcfa598a641cc8fbc9932590d69b4cfbc32cd09871c

    SHA512

    a278b1d36332be9f3c284c0a4716c5e130cc6e1524c03bd693769497aeed97360c74fb8466b2d0ffd474ea8fe545c6961674ea2668a0867aee270659ad0142cd

  • memory/4228-18-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4228-7-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/4228-5-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4980-28-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-32-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-22-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-24-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-26-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-15-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-30-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-20-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-34-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-36-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-38-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-40-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-42-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-44-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/4980-46-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB