Analysis

  • max time kernel
    91s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 08:03

General

  • Target

    0eb4ecd60165c579674fbe4288b73b35_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    0eb4ecd60165c579674fbe4288b73b35

  • SHA1

    2f82451c43bf5c513112921240c3c8447738f299

  • SHA256

    e76830bee97bd3990042509b07efff82faffb8b96be45512a1afec63afeefdf2

  • SHA512

    666edd20fb452dfb241c997511f1a91f43c099582db0d5004b99d6d39b88de1859d8864e5e6a5f7627dbb79f3d22a9ddddeb42647412cc86772477a927b9ef4b

  • SSDEEP

    24576:cuUTmNOrDY84Dt/XdYzBdu+CNIK2wad3Jd8Jyn7Z7JzC8DsHoMTMtbixxH0GP+C5:cUN849wxy3UfhqYOlDMv+

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0eb4ecd60165c579674fbe4288b73b35_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0eb4ecd60165c579674fbe4288b73b35_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57c40b.exe
      C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57c40b.exe 240632859
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1592

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57c40b.exe

          Filesize

          2.4MB

          MD5

          9d3d2a8d0e72e081548e968e511eb4c2

          SHA1

          a5523836b2fc82c4749169ed48f3bb5356aa38b4

          SHA256

          e152d5343a43baf5c60fa26974233e0c1d935b8af220cde1927ddb0129466424

          SHA512

          97363759abf7cab44b173fc561102563919bc31e65e526e12ae7d72c0d6866b6549ff50647905eb96a9c536ab91443c84d2eadedac968c3a29e2b2a2ff0fa745

        • memory/1592-5-0x00000000760DA000-0x00000000760DB000-memory.dmp

          Filesize

          4KB

        • memory/1592-10-0x0000000000400000-0x00000000006C6028-memory.dmp

          Filesize

          2.8MB

        • memory/4916-0-0x0000000000400000-0x00000000006C6028-memory.dmp

          Filesize

          2.8MB

        • memory/4916-9-0x0000000000400000-0x00000000006C6028-memory.dmp

          Filesize

          2.8MB