Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 14:33

General

  • Target

    406250fbaa2c18d3330586c480aa3620_JaffaCakes118.exe

  • Size

    151KB

  • MD5

    406250fbaa2c18d3330586c480aa3620

  • SHA1

    6fee985aa435ebb425ea71bf1f61b8c0ce4cd310

  • SHA256

    1c71cea25df52f6e804c7ddb23d85ba5ae2a1edee8d039f062df8af9f499bf20

  • SHA512

    b6d189032c1cc05ffb0b4ed828448268bb673d206a73074c73707892cfc376fcf99ede8919d9ecc5c19690890700c5dc9335cb6e00d871c78f7bf8f1a013cc50

  • SSDEEP

    3072:HAwEvRRdqcqpaiVPfGHO4xATzlypxd7CQn3piYtW0Cmz:TcRWcslXWRpjCS5TW0Cmz

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\406250fbaa2c18d3330586c480aa3620_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\406250fbaa2c18d3330586c480aa3620_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1344
  • C:\PROGRA~3\Mozilla\fchgaxm.exe
    C:\PROGRA~3\Mozilla\fchgaxm.exe -pjrnomj
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Mozilla\fchgaxm.exe

    Filesize

    151KB

    MD5

    2fd4ec8211394478547c398801d0bf0c

    SHA1

    36e05c8e76b4291eeb064b99fc87e758d160a736

    SHA256

    fc22b02d5e4e66db58508b0ef7a7cfe556408f3f03828b1405b49d4016150547

    SHA512

    9073a5adb8e8997a04b3f9b8ab06c2f6edf44d67df14cf7bf93d0020ecc279db4811fd13413e4de37cc1e92d27c0375cdbf6d97abf2120daeef45e95ed92a676

  • memory/1344-2-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1344-1-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/1344-3-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1344-9-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1524-11-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1524-12-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/1524-16-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB