Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 09:34

General

  • Target

    2ec52fafa581bb2cdd9036ac207488d5_JaffaCakes118.exe

  • Size

    173KB

  • MD5

    2ec52fafa581bb2cdd9036ac207488d5

  • SHA1

    992330db478393a0556ebaa9f25806935f7795cb

  • SHA256

    b1b7526eca4e6e3fb457ee3786b8bb8266d359ea7f3e8a774230b82c8338b2a1

  • SHA512

    6b487b4b3448f2cbf0aa1c9365f3e6512c2c5193de9e47a363c8547ab63b1e1b380f9d66d7f3fce62b4aac5989a298a1781ea78018f29d2a38daa5a8e40c28ae

  • SSDEEP

    3072:H0Gu9BlfzWIbXWW+w0JP5JsD+LIz6mgYPMukLXi8rzJDQlhuPbdl:U/0uYhBuyXzZQlh2f

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ec52fafa581bb2cdd9036ac207488d5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2ec52fafa581bb2cdd9036ac207488d5_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4540
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 540
        3⤵
        • Program crash
        PID:244
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4540 -ip 4540
    1⤵
      PID:1444

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exe

      Filesize

      140KB

      MD5

      c237cbd4ac471d31dc67c28c6d592c4c

      SHA1

      6f2cbdc55b3fa6e2c8318ad9685fca7e7cb40744

      SHA256

      ea6a4e7b0fa4403d980799396163392f880a38c19817354be0dcd7c2f244c8ba

      SHA512

      de4ede2cb82e57dacbc63c7151b22c5ad15f1072f2c228ab856f43f7dd8a857321b2aa760cdea286675a70141a39624a7b911fc61196efc3015b1aa2afa1b54e

    • memory/812-0-0x0000000001000000-0x000000000102F000-memory.dmp

      Filesize

      188KB

    • memory/812-6-0x0000000001000000-0x000000000102F000-memory.dmp

      Filesize

      188KB