Analysis

  • max time kernel
    150s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 11:56

General

  • Target

    f7f0daec5dc6cd272103d7672fa728ce_JaffaCakes118.exe

  • Size

    60KB

  • MD5

    f7f0daec5dc6cd272103d7672fa728ce

  • SHA1

    4705bd1cef9a3abc408576f2be6d52551c2a3eab

  • SHA256

    f73917d9b83ea04ac8ac86d8a9b1b31c1fd9e8982c4d0c4f458b49ac35eda040

  • SHA512

    6cabe9c552f5062e99968c343ee496ff934804e2bbcc5dc6836a4217ca87289f43252b1c9c7bbcd488d831ca2c989e4a64995503c464495469786e112daac37b

  • SSDEEP

    1536:DiKSnmWrew8ckC0MhdHz8iNtYpy/QA2xTW77LkCH:DD1WyovfiVq7Xk

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7f0daec5dc6cd272103d7672fa728ce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f7f0daec5dc6cd272103d7672fa728ce_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Sets file execution options in registry
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • System policy modification
    PID:3412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3412-1-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-2-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-4-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-5-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-6-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-7-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-8-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-10-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-11-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-12-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-13-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3412-14-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB