Analysis

  • max time kernel
    134s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 08:22

General

  • Target

    82712916212b0afb091628ef6e504807_JaffaCakes118.exe

  • Size

    659KB

  • MD5

    82712916212b0afb091628ef6e504807

  • SHA1

    7d3ca67ac52e82dc4b3b6cafa44ed5dba4524182

  • SHA256

    b960eebf53fcd2e17332eebc70391b29cd31445fdcdf5ea134c57ebf7bef4fb0

  • SHA512

    cde1013d9b4000c56b5ef748212abe25a66d94d5502145f65fb534d49665c09c37d343d96f3481b3d82d80cdc0d3ed8518da4c091c74b09c87a4c8754656726d

  • SSDEEP

    6144:EhYsafa0idunTIPDan9xTy2VTk0xfdI3QPTYiEYKB6eTBh+:EWlfiunTIe9hTk0xlI30TYUHeT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82712916212b0afb091628ef6e504807_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\82712916212b0afb091628ef6e504807_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Program Files (x86)\GSOPJr\svchost.exe
      "C:\Program Files (x86)\GSOPJr\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4404
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 1184
        3⤵
        • Program crash
        PID:4988
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4404 -ip 4404
    1⤵
      PID:2500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\GSOPJr\svchost.exe

      Filesize

      661KB

      MD5

      5bc72eef34210830dc1f2a4696b5fac1

      SHA1

      29699a79f7bad31a8c1aa636458d180f88e236bf

      SHA256

      9713b0f34e2a74438bf9357db73d490a24ef496eab45708d0e2359cddbe39f94

      SHA512

      388ead3297ec8f279b88ab32db96b2e1624e114063f22bef1d0368a3007192b6ea11197cced3f3c6266f66fd2f3529836951d07d9b1393a94ab16c8b6cc95b73

    • memory/4004-0-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/4004-8-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/4404-9-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/4404-12-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/4404-22-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB