Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2025 20:27

General

  • Target

    JaffaCakes118_af17dc085feb5687fbfa0c0928ec0c81.exe

  • Size

    879KB

  • MD5

    af17dc085feb5687fbfa0c0928ec0c81

  • SHA1

    b3d5560a770d41452fd81eb9ad12f2ff29556e7f

  • SHA256

    e9d0c0649dc40745881a672f6c0042e30563606481e1104cdecac3974e219f0e

  • SHA512

    687b1b53116fc9affea7c9b03c0c1f8fe00bcb1cb3720556ae23c67543ee589a152ffdba084ff927a0adbeff67a5b84a5fd7b4d5c7084b37cb3f52225cf5141c

  • SSDEEP

    12288:yoxejOONAM7GUC1Jr+4o628gx2Jw+tP3Jzm8JOuHXC3X+pd167QhEQO:hxY3NtGUmJr+4Obxd+tPZSZeiE6EhE

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Fakeav family
  • FakeAV payload 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_af17dc085feb5687fbfa0c0928ec0c81.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_af17dc085feb5687fbfa0c0928ec0c81.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:4772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4772-0-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/4772-6-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/4772-5-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB