Analysis

  • max time kernel
    134s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 23:01

General

  • Target

    912807d798d35323a534fdb59399a9b0_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    912807d798d35323a534fdb59399a9b0

  • SHA1

    2060d9f147311fdeec4de5f5d940b7a6f849846d

  • SHA256

    78ccba1d9e5d32658ce4cd4b2f8a8be65c6aa6a4f4eec2016777afb3a50ac843

  • SHA512

    58484e5ad1d0e121f750a2a845d99f6ce37071fd8a505d80f2afa51ecef2b55a8522f6ade1ca9e3412423cf6b2e992a337a67f5b101011d0710d21f0264742ab

  • SSDEEP

    3072:ePsv/P6gmhkFDDQKSZ4k5AF6xIsawMlkgu866:S9QD+zyF6xIsaFXP

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\912807d798d35323a534fdb59399a9b0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\912807d798d35323a534fdb59399a9b0_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Users\Admin\AppData\Local\Temp\912807d798d35323a534fdb59399a9b0_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\912807d798d35323a534fdb59399a9b0_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      PID:5104
  • C:\Windows\SysWOW64\strnirmala.exe
    "C:\Windows\SysWOW64\strnirmala.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Windows\SysWOW64\strnirmala.exe
      "C:\Windows\SysWOW64\strnirmala.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4268-21-0x0000000001750000-0x0000000001770000-memory.dmp

    Filesize

    128KB

  • memory/4268-30-0x0000000001710000-0x0000000001729000-memory.dmp

    Filesize

    100KB

  • memory/4268-15-0x0000000001730000-0x0000000001749000-memory.dmp

    Filesize

    100KB

  • memory/4268-19-0x0000000001730000-0x0000000001749000-memory.dmp

    Filesize

    100KB

  • memory/4268-20-0x0000000001710000-0x0000000001729000-memory.dmp

    Filesize

    100KB

  • memory/4400-23-0x00000000013E0000-0x00000000013F9000-memory.dmp

    Filesize

    100KB

  • memory/4400-28-0x0000000000C80000-0x0000000000C99000-memory.dmp

    Filesize

    100KB

  • memory/4400-33-0x0000000000C80000-0x0000000000C99000-memory.dmp

    Filesize

    100KB

  • memory/4400-29-0x0000000001400000-0x0000000001420000-memory.dmp

    Filesize

    128KB

  • memory/4400-27-0x00000000013E0000-0x00000000013F9000-memory.dmp

    Filesize

    100KB

  • memory/4440-6-0x00000000029A0000-0x00000000029C0000-memory.dmp

    Filesize

    128KB

  • memory/4440-5-0x00000000028A0000-0x00000000028B9000-memory.dmp

    Filesize

    100KB

  • memory/4440-1-0x0000000002880000-0x0000000002899000-memory.dmp

    Filesize

    100KB

  • memory/4440-14-0x0000000002880000-0x0000000002899000-memory.dmp

    Filesize

    100KB

  • memory/4440-0-0x00000000028A0000-0x00000000028B9000-memory.dmp

    Filesize

    100KB

  • memory/5104-11-0x00000000027E0000-0x00000000027F9000-memory.dmp

    Filesize

    100KB

  • memory/5104-7-0x00000000027E0000-0x00000000027F9000-memory.dmp

    Filesize

    100KB

  • memory/5104-13-0x0000000002810000-0x0000000002830000-memory.dmp

    Filesize

    128KB

  • memory/5104-12-0x00000000027C0000-0x00000000027D9000-memory.dmp

    Filesize

    100KB

  • memory/5104-22-0x00000000027C0000-0x00000000027D9000-memory.dmp

    Filesize

    100KB

  • memory/5104-31-0x00000000003E0000-0x0000000000403000-memory.dmp

    Filesize

    140KB

  • memory/5104-32-0x00000000027C0000-0x00000000027D9000-memory.dmp

    Filesize

    100KB