Analysis

  • max time kernel
    94s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 11:51

General

  • Target

    JaffaCakes118_64e22e622ed0f3bc0b1dc82995e73a90.exe

  • Size

    33KB

  • MD5

    64e22e622ed0f3bc0b1dc82995e73a90

  • SHA1

    d272f3cb41aa60abbc92b792ad4fdcdd1919a682

  • SHA256

    6d2be8ba66d1bcca8492a7cfbf18aea14402156c176f9e839fcf6ba787753c92

  • SHA512

    3d1afed07ef329449b42c6c215905f85f3fb8060705ee585498ac4f223a500f099b2eb3cc7b646019493e72f675f3499482011173e1226e3bb1a12f6e2fc6548

  • SSDEEP

    768:DxOdOHH++XIQ4Eg1NSI+RKr8r3PE7Fp2Sg6ck4T2:Le+XIQ4XNSI+Ri8TPUFp2X6c

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64e22e622ed0f3bc0b1dc82995e73a90.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64e22e622ed0f3bc0b1dc82995e73a90.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 832
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:4244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1572-0-0x0000000074BC2000-0x0000000074BC3000-memory.dmp

    Filesize

    4KB

  • memory/1572-1-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1572-2-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/1572-9-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB