Analysis

  • max time kernel
    94s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 04:17

General

  • Target

    JaffaCakes118_8ac2bdfeae0ff6156bb667f42d832c81.exe

  • Size

    239KB

  • MD5

    8ac2bdfeae0ff6156bb667f42d832c81

  • SHA1

    30e43fc578ca13150a5c85f7b899719619dcda2a

  • SHA256

    c1403c854426614a4d7bf78afdb7687aa7f20e66024be5ad05d331cfbceab7ff

  • SHA512

    a8170ea3797ffe80d16abe7469944b5baf3babf6b2d11e4775c79ad5ced25f26f2eb4d0b933ba29aa6d4b065f95a496ff513a207099f970817b32db917a1af7a

  • SSDEEP

    6144:wBlL/cHco/HkHqs7IPcKbQMMz8vPMLFGZ:CeHcKsCcaMpFc

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac2bdfeae0ff6156bb667f42d832c81.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac2bdfeae0ff6156bb667f42d832c81.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac2bdfeae0ff6156bb667f42d832c81.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac2bdfeae0ff6156bb667f42d832c81.exe"
      2⤵
        PID:648
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 964
        2⤵
        • Program crash
        PID:4416
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4324 -ip 4324
      1⤵
        PID:4312

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsl7AEE.tmp\lfpnfont.dll

        Filesize

        20KB

        MD5

        fa424f9b0c98afafb0671959f35139fb

        SHA1

        25f5c5139e5248c85f122eb42cdafc2d974d507a

        SHA256

        969d24cf93578bfd20c823ef79580dd61e007b00023fad94238e3e2e4bd5a479

        SHA512

        9176814ef19f8a1da11007b6d9c264308fae22905401f383bf516507bd6e210164644d588be177ea5c04667eeae520abfb4a0646a084f480c99bc433445f03e1

      • memory/4324-7-0x0000000074AE5000-0x0000000074AE7000-memory.dmp

        Filesize

        8KB