Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 18:24

General

  • Target

    4160ba0aa9830482aed2c802c8eff6fe_JaffaCakes118.exe

  • Size

    106KB

  • MD5

    4160ba0aa9830482aed2c802c8eff6fe

  • SHA1

    5fc4125eda8b848c2e17d12662a352f2e4c2bae1

  • SHA256

    d51005040fa51fec746252eb037a508a1b0789fbdf62edf2e19eae12394ea691

  • SHA512

    05c2283c69e005ad6f8c3e1a198d5e650062bfd757a7505c0f5a5df1f115348fbb0bcfe4548ce3d8b815670dff6675d1e41d8d8bdb7262e90677e0b033bc61ec

  • SSDEEP

    1536:we9zLIIZxrmTjrz4mIV9uOsRhzADnvhU1DzfHZawzf60ztlLaaxsfva:we9zLIm6muNRUvQ9af0ZNZ9

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4160ba0aa9830482aed2c802c8eff6fe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4160ba0aa9830482aed2c802c8eff6fe_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:1816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/844-0-0x0000000000570000-0x0000000000572000-memory.dmp

      Filesize

      8KB

    • memory/844-2-0x00000000005A0000-0x00000000005B3000-memory.dmp

      Filesize

      76KB

    • memory/844-3-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/844-7-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/844-6-0x0000000000600000-0x000000000060E000-memory.dmp

      Filesize

      56KB