Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 08:33

General

  • Target

    e0a338daaa920ad9884257f725440205_JaffaCakes118.exe

  • Size

    196KB

  • MD5

    e0a338daaa920ad9884257f725440205

  • SHA1

    7c5a798b88ec52d07491d05a6e284533955f743b

  • SHA256

    a3563874619c2009c804b33269ee2e80626173423e3328c57839e816363f8eca

  • SHA512

    32f5605163e2745cb51cdb136a9e341b5f4d9dd22e9cdfa11c1502e31368b18d60231a4e8524b28355038334f5d8431ede0921c3d41bbc6265a9093374412031

  • SSDEEP

    3072:P5IGQr+QpO1rUXiJqA35FnIzJ+vLJ4AH3J4AHmN2hQO6UfATvp1Zo7D0+BBK:hIGQHxXiqAJ5B4AHZ4AHmAeUYK7D/w

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0a338daaa920ad9884257f725440205_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e0a338daaa920ad9884257f725440205_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 136
      2⤵
      • Program crash
      PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1292-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1292-1-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB