Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 11:55

General

  • Target

    574d71d1a7566d377ee02f573266afbc_JaffaCakes118.exe

  • Size

    136KB

  • MD5

    574d71d1a7566d377ee02f573266afbc

  • SHA1

    7780509ad463437372deb6d8b39bfc3daf5e982f

  • SHA256

    cbc6a9613a37d35d37d7e80b3aa4f4be689a9d61c3d3b6fe568411cceecaa3e5

  • SHA512

    d8c71edf0ffae54c8b6e99cc4e4ed1636f46068c3fc876bcce359dc0852e0162e878e5fec9e788c9251295f83d8db0b9cb296d97b46b4820cb9101458743a3ec

  • SSDEEP

    3072:8nm3DXh2VA9hE5SwMH6js7/916Gq8WweZnDM2L3ShRwEG/H:16f5pMH6jrVPRDM2L7E6

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\574d71d1a7566d377ee02f573266afbc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\574d71d1a7566d377ee02f573266afbc_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\574d71d1a7566d377ee02f573266afbc_JaffaCakes118.exe
      ?
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2832-3-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2832-8-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/2832-4-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/2832-9-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2832-7-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/2996-1-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2996-0-0x0000000000403000-0x0000000000406000-memory.dmp

    Filesize

    12KB