Analysis

  • max time kernel
    104s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 03:01

General

  • Target

    JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe

  • Size

    391KB

  • MD5

    8a463cdcee1d43e4c42491f44b04c2f9

  • SHA1

    b7b247d16c51f64c3614e1f936bfd14f61dabf03

  • SHA256

    89b004a23d58255da50ca8d16457e858864c2a09592a5acf11bb279563d752e5

  • SHA512

    30162cc21be979e0162a5d29c34f16b92f2de72be9e1444d9b831c56489c70b7a16d2d533b99ffdee0a355adaf24ef64d8d4e9299255545000c82d111e13d1cc

  • SSDEEP

    6144:I/zl2NkDSDe+OwSPQXsPF98gWNlPTGQQm6agrdBXy:I/zl2NkwezasPsNtTirdBC

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a463cdcee1d43e4c42491f44b04c2f9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4104
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\PROGRA~1\COMMON~1\temps.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~1\COMMON~1\Temps.bat

    Filesize

    38KB

    MD5

    ea4bdfe7512baedfa4c30ffd59308934

    SHA1

    1430bf31a92f4023d7c83f736022de978aae1c2e

    SHA256

    1fba34623228c4e71c378d9da280984ad36fac636727a006da3df924dc65a8b7

    SHA512

    1ce5d4ee1032035b5fad4290af497f620507af956d351896d847a5e507f8a2ad2d1143954c32969a7d13aedf419da7d34c905cd3c9707c4bc0e9b8a0687b6db0

  • memory/4104-16-0x0000000002460000-0x0000000002461000-memory.dmp

    Filesize

    4KB

  • memory/4104-23-0x0000000002540000-0x0000000002541000-memory.dmp

    Filesize

    4KB

  • memory/4104-8-0x0000000002200000-0x0000000002201000-memory.dmp

    Filesize

    4KB

  • memory/4104-7-0x0000000002240000-0x0000000002241000-memory.dmp

    Filesize

    4KB

  • memory/4104-6-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4104-22-0x00000000024C0000-0x00000000024C1000-memory.dmp

    Filesize

    4KB

  • memory/4104-21-0x0000000002470000-0x0000000002471000-memory.dmp

    Filesize

    4KB

  • memory/4104-20-0x0000000002480000-0x0000000002481000-memory.dmp

    Filesize

    4KB

  • memory/4104-19-0x0000000002490000-0x0000000002491000-memory.dmp

    Filesize

    4KB

  • memory/4104-18-0x0000000002430000-0x0000000002431000-memory.dmp

    Filesize

    4KB

  • memory/4104-17-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/4104-0-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/4104-3-0x00000000021E0000-0x00000000021E1000-memory.dmp

    Filesize

    4KB

  • memory/4104-15-0x00000000024E0000-0x00000000024E1000-memory.dmp

    Filesize

    4KB

  • memory/4104-9-0x00000000023D0000-0x00000000023D1000-memory.dmp

    Filesize

    4KB

  • memory/4104-12-0x0000000002450000-0x0000000002452000-memory.dmp

    Filesize

    8KB

  • memory/4104-11-0x0000000002410000-0x0000000002411000-memory.dmp

    Filesize

    4KB

  • memory/4104-10-0x0000000002230000-0x0000000002231000-memory.dmp

    Filesize

    4KB

  • memory/4104-13-0x0000000002440000-0x0000000002443000-memory.dmp

    Filesize

    12KB

  • memory/4104-4-0x00000000021D0000-0x00000000021D1000-memory.dmp

    Filesize

    4KB

  • memory/4104-5-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/4104-2-0x00000000023F0000-0x00000000023F1000-memory.dmp

    Filesize

    4KB

  • memory/4104-14-0x00000000024D0000-0x00000000024D1000-memory.dmp

    Filesize

    4KB

  • memory/4104-30-0x0000000002250000-0x0000000002293000-memory.dmp

    Filesize

    268KB

  • memory/4104-29-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/4104-1-0x0000000002250000-0x0000000002293000-memory.dmp

    Filesize

    268KB