Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 05:50

General

  • Target

    38b1ec97268a6fb8b6bb07a68d851553_JaffaCakes118.exe

  • Size

    136KB

  • MD5

    38b1ec97268a6fb8b6bb07a68d851553

  • SHA1

    6402c124c4ebb70654dd350496f53baa4acea7c5

  • SHA256

    b1ed886d5492680fcc17eeccf10f62914754dfc3be92f36452e4ca92a8bec9fc

  • SHA512

    55300342f567ceb8815209baebfdcba3c06157ca0f736722f6b72435dac98e4b2021f0d192c6bd396bdd634756909b2830647439334f7d17483df31d1aa3c3d4

  • SSDEEP

    3072:Knm3DXh2VA9UBZSBYbDzGq8WweZnDM2LWShRwEc/T:b6NBsYzVPRDM2S7Es

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38b1ec97268a6fb8b6bb07a68d851553_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\38b1ec97268a6fb8b6bb07a68d851553_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\38b1ec97268a6fb8b6bb07a68d851553_JaffaCakes118.exe
      ?
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2324-2-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2324-1-0x0000000000403000-0x0000000000406000-memory.dmp

          Filesize

          12KB

        • memory/2332-3-0x0000000010000000-0x000000001000F000-memory.dmp

          Filesize

          60KB

        • memory/2332-8-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2332-7-0x0000000010000000-0x000000001000F000-memory.dmp

          Filesize

          60KB

        • memory/2332-6-0x0000000010000000-0x000000001000F000-memory.dmp

          Filesize

          60KB