Analysis

  • max time kernel
    92s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 00:43

General

  • Target

    1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe

  • Size

    65KB

  • MD5

    1581dcba3c9ed9ecde6506e7a105c71a

  • SHA1

    a32fa59af3691a4d4f759897aad040e5e23dca20

  • SHA256

    ab6f12c1ecd3c4cc8957b537b8c71d85505e3623a734a68e1988f129f112ad7c

  • SHA512

    44319ff91ea838d866a64c9ba8118f0ee04433854599ccfbf61ebe152f2bce368ff1aad014d94abb8cb1da2221daf44ebdd5c3135a75d1b4c6788d0b074c6f37

  • SSDEEP

    768:5fVvcgfxCWLvBlHa4LIushRaDkJ23Gj3TEJdeQaOmb1wkGq6+sQCGVjdrcPK3Qm:9Jx5XaPIDu2WzT6eQa9EwCGdOPK3x

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1581dcba3c9ed9ecde6506e7a105c71a_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Print Processors
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:3572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\spool\prtprocs\x64\xm3gMYWSK9.dll

    Filesize

    9KB

    MD5

    ab9a4f4df517d9ba2ccea85dbddb2a1d

    SHA1

    8c8bc81983d42d4dd541b354bce99a7329b84e75

    SHA256

    791e7670be7e3b022f2fef9bf87499a3dfc9f31b02155a842cbc723a7e24881c

    SHA512

    8b7c1a46b042a0548bce84688909b6b4dd2b723aa6bc462253bbc91ad187ac8e9d56ae6ff095840adceb2860dda0745da7b9c779d21aa6a3356be416cedf0cd2

  • memory/3572-0-0x00000000009E0000-0x00000000009E4000-memory.dmp

    Filesize

    16KB

  • memory/3572-4-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB