Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 12:19

General

  • Target

    39f9fdd904762d4243f23f962f258a4b_JaffaCakes118.exe

  • Size

    89KB

  • MD5

    39f9fdd904762d4243f23f962f258a4b

  • SHA1

    dc03f8717eaadb84e1e3e1fec63e451103c17759

  • SHA256

    c170c3dd16d027c0da821d1d62a4d577ae461c8f25f56291342dbe7c3d4b1856

  • SHA512

    337724a2ab484680044fc1b5935ddd10c8a2151593bb65084072527138734a6a8ecc31c5718b5845d0f2aad2ec884db3560895c18a6f29ab67429e2c2647bddb

  • SSDEEP

    1536:SWWisl8H3mgwGf6tOtLR9zqK6uK6+K6NK6qzb:GF8HWz70tLR9zocsRqP

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39f9fdd904762d4243f23f962f258a4b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\39f9fdd904762d4243f23f962f258a4b_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\ProgramData\pcdfdata\39f9fdd904762d4243f23f962f258a4b_JaffaCakes118.exe
      C:\ProgramData\pcdfdata\39f9fdd904762d4243f23f962f258a4b_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
        3⤵
          PID:2132

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1352-2-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/1352-6-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/1352-7-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/4700-0-0x0000000002050000-0x0000000002057000-memory.dmp

      Filesize

      28KB

    • memory/4700-1-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/4700-5-0x0000000002050000-0x0000000002057000-memory.dmp

      Filesize

      28KB