Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 04:58

General

  • Target

    0e0751387526461a26a8342989e89eaf_JaffaCakes118.exe

  • Size

    17KB

  • MD5

    0e0751387526461a26a8342989e89eaf

  • SHA1

    c1c63b2dd0b60eb56c9bee653e49b1a734717402

  • SHA256

    dd3344e58c7f196f91cd009d83b62ea9c607502ac36bda2a039e43c853e73bac

  • SHA512

    bbcea8702ef6bca1926c5945f6d9f1a67877706cf19f6b3a17186d7eef0f33c07bf31d327c4034ab0502d571e180fd041d0c85b40dff44da02e5983057eb3b4b

  • SSDEEP

    384:Ilee64qH/8nUGp6vtBo5NL7e6yypJ/0Ax8r6+S9Pfu7n5:A36TH/8UFK5NLi+xLdeV

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e0751387526461a26a8342989e89eaf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e0751387526461a26a8342989e89eaf_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 256
      2⤵
      • Program crash
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2068-2-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB