Analysis

  • max time kernel
    120s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 05:53

General

  • Target

    f076e75b29e4fc57cb579100235a87a2_JaffaCakes118.exe

  • Size

    4.2MB

  • MD5

    f076e75b29e4fc57cb579100235a87a2

  • SHA1

    11db394b43907c10d2dbebfa5bc9e700dd11d0b2

  • SHA256

    43f18a583672845d99a170b2253c04296fce919b15f135f7c8d03ca380a234e1

  • SHA512

    ac46f709201bfb73581f9703fc15478d2e814a0029bfe8066a0195509fda9768c5233c753b00c24dd5f6fbfdf5079e443671fb1867203bfc9cb9b9f81faa40ac

  • SSDEEP

    24576:j2ROf1IegqutJQ5FeQzcuC4r6HQrc+lPYlCcuzKPgssStPUvgelGM/HEp6uu854s:j2RAR5FeA6wrvhKPgssSt2gEEp6yH

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f076e75b29e4fc57cb579100235a87a2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f076e75b29e4fc57cb579100235a87a2_JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1340-0-0x0000000001DE0000-0x0000000001DE1000-memory.dmp

    Filesize

    4KB

  • memory/1340-1-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/1340-2-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/1340-3-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/1340-4-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/1340-5-0x0000000001F40000-0x0000000001F4A000-memory.dmp

    Filesize

    40KB

  • memory/1340-7-0x0000000001F40000-0x0000000001F4A000-memory.dmp

    Filesize

    40KB

  • memory/1340-6-0x0000000001F40000-0x0000000001F4A000-memory.dmp

    Filesize

    40KB

  • memory/1340-8-0x0000000001F40000-0x0000000001F4A000-memory.dmp

    Filesize

    40KB

  • memory/1340-9-0x000007FEF6CC0000-0x000007FEF6DF1000-memory.dmp

    Filesize

    1.2MB

  • memory/1340-15-0x0000000001DE0000-0x0000000001DE1000-memory.dmp

    Filesize

    4KB

  • memory/1340-16-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/1340-17-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/1340-18-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/1340-19-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/1340-20-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/1340-21-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/1340-22-0x0000000001F40000-0x0000000001F4A000-memory.dmp

    Filesize

    40KB

  • memory/1340-23-0x0000000001F40000-0x0000000001F4A000-memory.dmp

    Filesize

    40KB

  • memory/1340-24-0x000007FEF6CC0000-0x000007FEF6DF1000-memory.dmp

    Filesize

    1.2MB