Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 05:36

General

  • Target

    165d96e54f145c03b796f7eb1af5ec98_JaffaCakes118.exe

  • Size

    20KB

  • MD5

    165d96e54f145c03b796f7eb1af5ec98

  • SHA1

    d20c3fe12dc8d8e29892a02f6eff8fe98f40b114

  • SHA256

    f39165c0ad020bd21d1de6a112caac0be10106240b66b3f93459cde7dc353aee

  • SHA512

    8e1aa2af7b0026de65e3f28c99496a5ac7c02221dc43a13281928af45cc7924e2ef9961d7fad86946d97d338c6d230ba35e8aaf48c2e1bc2248fa8a3528072e3

  • SSDEEP

    192:cIaOFbwbRoOFbwbRgPy6GeC/8bJfYHXDQ1qOFbwbRsn:eOFOoOFOgPlCU1fYHMoOFOsn

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\165d96e54f145c03b796f7eb1af5ec98_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\165d96e54f145c03b796f7eb1af5ec98_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 148
      2⤵
      • Program crash
      PID:2896

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads