Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 08:08

General

  • Target

    0eb824375aa6cb3c4a95c0e19139488b_JaffaCakes118.exe

  • Size

    226KB

  • MD5

    0eb824375aa6cb3c4a95c0e19139488b

  • SHA1

    b12faf67d191f5e09b73303c3e82adf721ac659b

  • SHA256

    a5777e7d9c18f53c141a84d57e069827d1250693b1fe89b79d0096e1e2fb7c46

  • SHA512

    ba23468233cfea41d7308ac955b4889d8850c802aab417bd0e150e686960e992292225f627b940e6eb041e13b7b6a369904c7039da7f6e3b78bc9a81a09f1926

  • SSDEEP

    1536:bBej95nc6HSpg+UIqnEixqDnLa95bOVwOMD13qOvEQz5v26tY7acKfPD6x0D:ILnc6NoqnxqKflioiKnD6GD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0eb824375aa6cb3c4a95c0e19139488b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0eb824375aa6cb3c4a95c0e19139488b_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\a23195.bat "C:\Users\Admin\AppData\Local\Temp\0eb824375aa6cb3c4a95c0e19139488b_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a23195.bat

    Filesize

    82B

    MD5

    c280339547d59884821f6e68d9e101c0

    SHA1

    7cb036751b5bc0647fd685a1dbe0ce360714c6d7

    SHA256

    1f4952721aa1f450ad6d0ad01c11239a390ab4a0d3522999e3dfd5148dcc8a3b

    SHA512

    d874247b2ff5a109334dd8cd0406698602405884f8018b339b11eaa1f44ca36184b716c370a25a8493535ded28f78f8b614833719d8b5273debb96b452fe9778

  • memory/1868-3-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB