Analysis

  • max time kernel
    131s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2025, 23:15

General

  • Target

    JaffaCakes118_3c44aa63ba563fcd93e53589b424cdac.exe

  • Size

    85KB

  • MD5

    3c44aa63ba563fcd93e53589b424cdac

  • SHA1

    d860b7faed1bfbb373db5ec2c0e36d45cb56cd4f

  • SHA256

    265f65ef1529e1e11af3ee5879fbaa7f4247f4c0b6abd15185640ae2c0639de0

  • SHA512

    ae02b84f573bbac5c8f63b3e612c88a766cc715e8f35534c3fa821dc4af3c630ad7d2810ec95fcb307c21a01233b2a15a0c01088af3825acb7db576d13157be5

  • SSDEEP

    1536:3qp2oQrAPHV4X/42dX49uSxNy5fuAOKzxiTQCF+oIjVhhPoSeFBd:3qp6X/4eI9RNZAOKCQp5hhPo9Fv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c44aa63ba563fcd93e53589b424cdac.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c44aa63ba563fcd93e53589b424cdac.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Users\Admin\AppData\Local\Temp\~240613609.tmp.exe
      C:\Users\Admin\AppData\Local\Temp\~240613609.tmp.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4644
    • C:\Users\Admin\AppData\Local\Temp\~240613609.tmp\JaffaCakes118_3c44aa63ba563fcd93e53589b424cdac.exe
      C:\Users\Admin\AppData\Local\Temp\~240613609.tmp\JaffaCakes118_3c44aa63ba563fcd93e53589b424cdac.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~240613609.tmp.exe

    Filesize

    11KB

    MD5

    4e868495efa86e0f86cfb320be3450ab

    SHA1

    8e830b1c1f25beed46bb23abf9888ebab13a189f

    SHA256

    021d0831e2d7c9ec05c70e84a7e8d9bfdbf064ba0db0136062547cafa8a11fa3

    SHA512

    c2fa59870067695b642880504f12283079515cabf330d66219156ad0a4eeb2dc105e48f2fd25400d5c0fe17ffee5a7eb3f6703a3a529c79b2c2fca88f0f5fe02

  • C:\Users\Admin\AppData\Local\Temp\~240613609.tmp\JaffaCakes118_3c44aa63ba563fcd93e53589b424cdac.exe

    Filesize

    72KB

    MD5

    71e6dd8a9de4a9baf89fca951768059a

    SHA1

    aac779471a2f9ae3d3e0e39047ef1744feda77b1

    SHA256

    5656e87da0641c9dcfcd0ee8949ce72b3fa6a7d0e8b1fd985a16f6bd6c34ce52

    SHA512

    d15bb31ce595767dd366ea2130121a7a2a311c4e639f8b464ceac880d00735c11d950fc16725a3da9459d22a122dd3c33bc0631be90556b4078df9509b0048de

  • memory/4392-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4392-12-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4644-5-0x0000000013140000-0x0000000013149000-memory.dmp

    Filesize

    36KB

  • memory/4644-8-0x0000000013140000-0x0000000013149000-memory.dmp

    Filesize

    36KB