Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2024 16:50

General

  • Target

    52b330d60b33fe0fa81ae36996522b74_JaffaCakes118.exe

  • Size

    46KB

  • MD5

    52b330d60b33fe0fa81ae36996522b74

  • SHA1

    9f593b01cfffb8a374694e8ca08ad9719063a7f5

  • SHA256

    91c7fb0388da418c53edd2ba43b45d6367ef06451d8f3cb57dbc81a07f3eea60

  • SHA512

    498ac8463d879e7826408cf39f2b219db2a95eac8b9012e1066e73d364ae811e2bcbddf58cd8bd0fc589a8ac36aec23cfad9fd48d5bcac16e66f9d81c2281496

  • SSDEEP

    768:DvNlOQ+giX1714BtfOWCJ9Dh11gy4CEEEPM9VtMlUa2h/R4xL74Spr98rMuXj4SN:7POQdiX1GBAx31xUnPEDMWa4+d4SpJov

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3444
      • C:\Users\Admin\AppData\Local\Temp\52b330d60b33fe0fa81ae36996522b74_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\52b330d60b33fe0fa81ae36996522b74_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3008-0-0x0000000013140000-0x000000001315F000-memory.dmp

      Filesize

      124KB

    • memory/3008-3-0x0000000013140000-0x000000001315F000-memory.dmp

      Filesize

      124KB