Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2024 17:39

General

  • Target

    86b9aaa399ec6aa5a99f539922c860c1_JaffaCakes118.exe

  • Size

    317KB

  • MD5

    86b9aaa399ec6aa5a99f539922c860c1

  • SHA1

    83ac3e0814306b580d77f0bd891c279c57cfccb5

  • SHA256

    c59840f2a37cc434ef9e343de8cb199142f80d6dd77e7cfa0869972c76f2af34

  • SHA512

    266163a3160cb86ab289a5d3f7e8c522a87c48dafab681bfb2d13a26e60672f8f1fa00382949b5c51794da8c3622be5b5887e439727c4678dc57a36547b016f6

  • SSDEEP

    6144:QGHX5Iphy5jt7XKk7ZHhooeIhcK7O46LalbCPrHWV730Q/CR8SEoZtF:QAX5Z7t7xmCcK7gLMCL8bKooZz

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86b9aaa399ec6aa5a99f539922c860c1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\86b9aaa399ec6aa5a99f539922c860c1_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\86b9aaa399ec6aa5a99f539922c860c1_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\86b9aaa399ec6aa5a99f539922c860c1_JaffaCakes118.exe"
      2⤵
        PID:1724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 472
        2⤵
        • Program crash
        PID:2852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2900 -ip 2900
      1⤵
        PID:3288

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2900-2-0x00000000021E0000-0x00000000021E2000-memory.dmp

        Filesize

        8KB

      • memory/2900-1-0x00000000000A0000-0x00000000001A0000-memory.dmp

        Filesize

        1024KB