Analysis

  • max time kernel
    95s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 17:20

General

  • Target

    1441ae2fd1e9d4da4d5777fbd0c450ff_JaffaCakes118.exe

  • Size

    325KB

  • MD5

    1441ae2fd1e9d4da4d5777fbd0c450ff

  • SHA1

    4862b4ea07cb55af8f569d7f086ba129c348a2db

  • SHA256

    f01d1d78173fb0ae73ecb128e48c8b6685db953de507368f863590fba857205c

  • SHA512

    97c086bff8a9d4cec9ce32154dcfbcfdc6a79dd2537f4b06a985d369b55f2918ae183edca19c35fa8ff994fccbacccf62b4c03a8423f62a7c7cede4d85519b4a

  • SSDEEP

    3072:KrlmVBilN8u+qtf6U8w8eQQLCczImGgy0mzqHh3kwQmcgrV9E004NOFVqDlEQrOJ:Krl8sf608N/cz9GD0mOh3Jhh9Ha24cYd

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1441ae2fd1e9d4da4d5777fbd0c450ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1441ae2fd1e9d4da4d5777fbd0c450ff_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\bhs5FB4.tmp

          Filesize

          241KB

          MD5

          d70cbeebf027958b345d7a8c5f58bae9

          SHA1

          9e98d6fcb9e4a5119cf345e752f38ab013094775

          SHA256

          a41a9fefe9b545590af058111930503ec52babc6c8e22b856810dbe980a37359

          SHA512

          88a50f0a3edfb99b18089cb3f3f6e03ce6cbd164f6ad19405fde82aca18c62af617509e31ded26ae58f19cacb950b139443fabbfb179e43681845ad85f2b3d35

        • memory/4472-7-0x0000000005A60000-0x0000000005A6A000-memory.dmp

          Filesize

          40KB

        • memory/4472-3-0x0000000005800000-0x0000000005842000-memory.dmp

          Filesize

          264KB

        • memory/4472-5-0x0000000005FC0000-0x0000000006564000-memory.dmp

          Filesize

          5.6MB

        • memory/4472-4-0x00000000748E0000-0x0000000075090000-memory.dmp

          Filesize

          7.7MB

        • memory/4472-6-0x0000000005AB0000-0x0000000005B42000-memory.dmp

          Filesize

          584KB

        • memory/4472-0-0x00000000748EE000-0x00000000748EF000-memory.dmp

          Filesize

          4KB

        • memory/4472-8-0x00000000748E0000-0x0000000075090000-memory.dmp

          Filesize

          7.7MB

        • memory/4472-9-0x00000000748E0000-0x0000000075090000-memory.dmp

          Filesize

          7.7MB

        • memory/4472-11-0x00000000748E0000-0x0000000075090000-memory.dmp

          Filesize

          7.7MB

        • memory/4472-10-0x0000000009370000-0x00000000093D6000-memory.dmp

          Filesize

          408KB

        • memory/4472-14-0x000000000AE10000-0x000000000B5B6000-memory.dmp

          Filesize

          7.6MB

        • memory/4472-21-0x00000000748EE000-0x00000000748EF000-memory.dmp

          Filesize

          4KB

        • memory/4472-22-0x00000000748E0000-0x0000000075090000-memory.dmp

          Filesize

          7.7MB