Analysis

  • max time kernel
    93s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 18:50

General

  • Target

    148a2ba4b886c1927db878d54522c9bd_JaffaCakes118.exe

  • Size

    20KB

  • MD5

    148a2ba4b886c1927db878d54522c9bd

  • SHA1

    299d74d36560b7b1bac240ff85c0cf82baa23e86

  • SHA256

    a48e09b6c0cf1cc165081c3368efe2adf21ce3d1f985e2ab0ba756b0ce849308

  • SHA512

    e84a1ab3fb68f94fbc4ccd264d2e7d30b0432f00588bc18139a989dd7319b66854e8d24436ff797f6f82d9df3e428a3b9549b09553e601553a7727b0acadd81c

  • SSDEEP

    6:iz3SsE7MvK/9822eApxQ1uBORIBvuJKQmQ:w6MyW/yuORIBvuJ5

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\148a2ba4b886c1927db878d54522c9bd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\148a2ba4b886c1927db878d54522c9bd_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1612
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 252
      2⤵
      • Program crash
      PID:2908
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 284
      2⤵
      • Program crash
      PID:3292
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1612 -ip 1612
    1⤵
      PID:2928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1612 -ip 1612
      1⤵
        PID:2052

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1612-0-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1612-1-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB