Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 04:24

General

  • Target

    5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe

  • Size

    602KB

  • MD5

    5576c9203f30cf539dd6cd55ef1e566e

  • SHA1

    75c11270030685e2af67a349bf685c8e5b1cb727

  • SHA256

    3b9deac1498962c1da3b51c3dea5a686590aadb731a3a9199b3acbe5f2b2402f

  • SHA512

    1acc4ca48d78c2d1c0e19342aa627ecc7e3cb196908bcada9bd0d93a2dde9421157d6b36fb909700533923084a7bb0e6546833250d98c4a99a14da95dea4f333

  • SSDEEP

    12288:JdIPydX22jbAW59EjyfRMLpZHiSsrHx79TfXr5M88Mw8KiOFMzg39n/ZJ7:oPyplbz9P9SsrHx79Tfy88DxiOF4OLt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Local\Temp\5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118mgr.exe
      C:\Users\Admin\AppData\Local\Temp\5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118mgr.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 264
        3⤵
        • Program crash
        PID:1948
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4924 -ip 4924
    1⤵
      PID:3504

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\5576c9203f30cf539dd6cd55ef1e566e_JaffaCakes118mgr.exe

            Filesize

            105KB

            MD5

            98a8ced05b34189b8b36760049b2ea36

            SHA1

            a5271250fb91d891c7df0cae7812ed68907ae076

            SHA256

            e50689964fa016ff34ad6517bb863e26e571f907635e719f1fe5e70a61763d95

            SHA512

            8548b7dc08007fe55e2b7f9bf502c7271655edff52100bb8445a321f37137139c0cd54f7f85558a2f99b38dd574c8435371adc07f8c365bf8a8561c63fe6be45

          • memory/2496-0-0x0000000000400000-0x0000000000B64000-memory.dmp

            Filesize

            7.4MB

          • memory/2496-9-0x0000000000400000-0x0000000000B64000-memory.dmp

            Filesize

            7.4MB

          • memory/2496-10-0x0000000000400000-0x0000000000B64000-memory.dmp

            Filesize

            7.4MB

          • memory/4924-6-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/4924-7-0x0000000000590000-0x0000000000591000-memory.dmp

            Filesize

            4KB