Analysis

  • max time kernel
    91s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 10:28

General

  • Target

    3f554093bf11927d397c02548fd83f78_JaffaCakes118.exe

  • Size

    169KB

  • MD5

    3f554093bf11927d397c02548fd83f78

  • SHA1

    bbd78d3a6a8191a60833deb4177904b36c7ed12f

  • SHA256

    b41da6f30d0d4e1012c0cef315c18c22802dc8b2e025658d4b6f9d199907eb9d

  • SHA512

    ddb4dc449806cc4eaeb522b1983dbff3cb6abe60f076db5136d3440090c448e0dd99f3a60a9796b90fd1a75571426a43fd449c714d1c458bb7db7242d6c59d21

  • SSDEEP

    3072:Ktp0/3P/ssC5WI9Nz0jbg3iTtKH/joSQRYWub:KtO9wab6uoGC

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f554093bf11927d397c02548fd83f78_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f554093bf11927d397c02548fd83f78_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:1316

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1628-0-0x0000000000540000-0x0000000000542000-memory.dmp

            Filesize

            8KB

          • memory/1628-1-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/1628-2-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/1628-3-0x0000000000420000-0x000000000042E000-memory.dmp

            Filesize

            56KB