Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 03:42

General

  • Target

    JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe

  • Size

    918KB

  • MD5

    4b822ff53f5ad740eeaba9e1bb26ad68

  • SHA1

    d3e4912cce03f627ab8da804fc0151c7815f5eb4

  • SHA256

    2d21d56c6e2bb7643be411747eabf7c9eaf5316a1520e3a84f1363c53075d87c

  • SHA512

    3e4962fe88bac0a4e3d38656b90c5b5229f61b14278c6e9c335118fb1b30a953698187d41ff4624ee93ae39a62268b1c8476e83afc29b9264f430e11e18713d2

  • SSDEEP

    24576:KrRKzyKje6aY8FGjyDUYZluEhckcUkdH:ORKWKje6wQjcU+lrkt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe"
      2⤵
        PID:2568
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe"
        2⤵
          PID:2060
        • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe
          "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe"
          2⤵
            PID:1744
          • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe
            "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe"
            2⤵
              PID:2812
            • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe
              "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b822ff53f5ad740eeaba9e1bb26ad68.exe"
              2⤵
                PID:2592

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2380-0-0x000000007495E000-0x000000007495F000-memory.dmp

              Filesize

              4KB

            • memory/2380-1-0x0000000000340000-0x000000000042C000-memory.dmp

              Filesize

              944KB

            • memory/2380-2-0x0000000074950000-0x000000007503E000-memory.dmp

              Filesize

              6.9MB

            • memory/2380-3-0x00000000002A0000-0x00000000002AE000-memory.dmp

              Filesize

              56KB

            • memory/2380-4-0x000000007495E000-0x000000007495F000-memory.dmp

              Filesize

              4KB

            • memory/2380-5-0x0000000074950000-0x000000007503E000-memory.dmp

              Filesize

              6.9MB

            • memory/2380-6-0x0000000004BF0000-0x0000000004C50000-memory.dmp

              Filesize

              384KB

            • memory/2380-7-0x0000000074950000-0x000000007503E000-memory.dmp

              Filesize

              6.9MB