Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2025 15:58

General

  • Target

    JaffaCakes118_5b572bea2d6b56907d78d722b382ee30.exe

  • Size

    285KB

  • MD5

    5b572bea2d6b56907d78d722b382ee30

  • SHA1

    8d8e93390beaf88bee51e8ae52a23a48799b47ed

  • SHA256

    8d36a9fbd7cb689672489b3e2d8b769e07fdcc06cc410ee0ccc2b8e5ec36bd57

  • SHA512

    750af86e429fc96c9d4595b0df1dc8a805b53720e631bb63e905fd5be99ffed423df6c60d661270644af44a18bf0b656feabcc716897b0ec33584dbf2a9f0dd2

  • SSDEEP

    768:pZZpe06/gmAV4+RiHdxOnW5MedsruJDWaS77BKbwexZw32SLg0innjhyVT8w:n6/gmM2WW5MeGD7BKb7+it2Aw

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b572bea2d6b56907d78d722b382ee30.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b572bea2d6b56907d78d722b382ee30.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b572bea2d6b56907d78d722b382ee30.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b572bea2d6b56907d78d722b382ee30.exe
      2⤵
        PID:3608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/828-0-0x0000000074BFE000-0x0000000074BFF000-memory.dmp

      Filesize

      4KB

    • memory/828-1-0x0000000000800000-0x000000000084E000-memory.dmp

      Filesize

      312KB

    • memory/828-2-0x0000000005860000-0x0000000005E04000-memory.dmp

      Filesize

      5.6MB

    • memory/828-3-0x00000000051E0000-0x0000000005272000-memory.dmp

      Filesize

      584KB

    • memory/828-4-0x0000000005290000-0x000000000529A000-memory.dmp

      Filesize

      40KB

    • memory/828-5-0x0000000074BF0000-0x00000000753A0000-memory.dmp

      Filesize

      7.7MB

    • memory/828-6-0x0000000006880000-0x000000000691C000-memory.dmp

      Filesize

      624KB

    • memory/828-7-0x0000000005480000-0x000000000548A000-memory.dmp

      Filesize

      40KB

    • memory/828-12-0x0000000074BF0000-0x00000000753A0000-memory.dmp

      Filesize

      7.7MB

    • memory/828-13-0x0000000074BF0000-0x00000000753A0000-memory.dmp

      Filesize

      7.7MB

    • memory/828-14-0x0000000074BF0000-0x00000000753A0000-memory.dmp

      Filesize

      7.7MB

    • memory/828-15-0x0000000074BF0000-0x00000000753A0000-memory.dmp

      Filesize

      7.7MB

    • memory/828-16-0x0000000008B40000-0x0000000008B58000-memory.dmp

      Filesize

      96KB

    • memory/828-18-0x0000000074BF0000-0x00000000753A0000-memory.dmp

      Filesize

      7.7MB