Analysis

  • max time kernel
    95s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 16:12

General

  • Target

    140dd1f403b072832ad10ad6eb0da9e1_JaffaCakes118.exe

  • Size

    11KB

  • MD5

    140dd1f403b072832ad10ad6eb0da9e1

  • SHA1

    bf62cda4750ce85b2a05573ea1f340da5aa0c97f

  • SHA256

    ea47b163dcbaac73ae348890a9d457e06294be166766a0054fff714202a9df2c

  • SHA512

    c2d52ee9a27fec77e5639cbcf68fee0207cae578ba459ca9888c52f5292fcbc8e9fed2d298738770f2bf2fbddfdce790f4bef92836856e910b3e3b184b2e0231

  • SSDEEP

    192:tYLhmz1pVZtM+H/1cRVIa/mWyrwS+HbaAvGMoQJZYwL7h3bH8kgUwuF:tA+Q+f1cRVI9wSqwQgw53bjb

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\140dd1f403b072832ad10ad6eb0da9e1_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\140dd1f403b072832ad10ad6eb0da9e1_JaffaCakes118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5000
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 C:\Users\Admin\AppData\Local\Temp\~e579606.~~~ INS C:\Users\Admin\AppData\Local\Temp\140dd1f403b072832ad10ad6eb0da9e1_JaffaCakes118.exe
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1684

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\~e579606.~~~

            Filesize

            37KB

            MD5

            1454db4aba78903dca39af4b1b490534

            SHA1

            d638c16aebc1db084c58db2aec071e7abf370e8e

            SHA256

            534d7f253515093aa33e9e4b9b19ab3311e0028151ab0596f83360417932a80a

            SHA512

            e5f6f339d672475adf66132ef9185df2def6d684351eb1ad27af554523abb20c24c841ccf08383721f5e48e1ec4b7cc457f147d80445dfb20b91b526ed7c83a4

          • memory/1684-5-0x0000000010000000-0x000000001001D000-memory.dmp

            Filesize

            116KB

          • memory/5000-0-0x0000000000400000-0x0000000000419000-memory.dmp

            Filesize

            100KB

          • memory/5000-2-0x0000000000400000-0x0000000000419000-memory.dmp

            Filesize

            100KB