Analysis Overview
score
10/10
SHA256
027629fd71aab16bc5951e81865233abd02276ebad5eecd6babc2133ebf46197
Threat Level: Known bad
The file f3d5e52b50b9b30d7675610930e7e785_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Expiro, m0yv
Expiro payload
Unsigned PE
MITRE ATT&CK
N/A
Analysis: static1
Detonation Overview
Reported
2024-04-16 16:08
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-16 16:08
Reported
2024-04-16 16:11
Platform
win10v2004-20240412-en
Max time kernel
124s
Max time network
129s
Command Line
"C:\Users\Admin\AppData\Local\Temp\f3d5e52b50b9b30d7675610930e7e785_JaffaCakes118.exe"
Signatures
Expiro, m0yv
Expiro payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\f3d5e52b50b9b30d7675610930e7e785_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\f3d5e52b50b9b30d7675610930e7e785_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 130.211.222.173.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| NL | 23.62.61.160:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 105.104.123.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.114.53.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 160.61.62.23.in-addr.arpa | udp |
| US | 20.231.121.79:80 | tcp | |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 65.139.73.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 147.211.222.173.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.112.168.52.in-addr.arpa | udp |
Files
memory/2384-0-0x0000000000400000-0x0000000000504000-memory.dmp
memory/2384-1-0x0000000000400000-0x0000000000504000-memory.dmp