Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 04:07

General

  • Target

    55651e819cdd4357f86979c170e17239_JaffaCakes118.exe

  • Size

    648KB

  • MD5

    55651e819cdd4357f86979c170e17239

  • SHA1

    9094d3ca8da6ab2bfe5d1746f0bcc5d6a65f8724

  • SHA256

    a7d7859163969822019913ebc4c52ab50574d2ba6c6a8137ee023de0c746372c

  • SHA512

    377c127e44de78e636996cc093736c66dd0931c7efbbf914e98ce6b4cbf6f2a0087fef3e98a2a4da57d0484c24ad61cc49a4c8d776c730afa03c882d27e99b62

  • SSDEEP

    12288:C2T/BBYNPP4V4FR/PLJ1g+Pb7NBr1C3c64FMJx6pSO8nZGgNsx7I5kY:C2T8/J1RPVBM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe"
      2⤵
        PID:2832
      • C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe"
        2⤵
          PID:2952
        • C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe"
          2⤵
            PID:2720
          • C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe"
            2⤵
              PID:2360
            • C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\55651e819cdd4357f86979c170e17239_JaffaCakes118.exe"
              2⤵
                PID:2692

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2076-0-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

              Filesize

              4KB

            • memory/2076-1-0x00000000003A0000-0x0000000000448000-memory.dmp

              Filesize

              672KB

            • memory/2076-2-0x00000000004B0000-0x00000000004EE000-memory.dmp

              Filesize

              248KB

            • memory/2076-3-0x0000000074C50000-0x000000007533E000-memory.dmp

              Filesize

              6.9MB

            • memory/2076-4-0x00000000004F0000-0x0000000000506000-memory.dmp

              Filesize

              88KB

            • memory/2076-5-0x0000000074C50000-0x000000007533E000-memory.dmp

              Filesize

              6.9MB