Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 02:08

General

  • Target

    fe2ed76a199e3e7213ca266b3c05d9f0_JaffaCakes118.exe

  • Size

    452KB

  • MD5

    fe2ed76a199e3e7213ca266b3c05d9f0

  • SHA1

    f2eff616ad2865ed0be4aaf46d9832d1a50189cf

  • SHA256

    143393d2c44ea6fd38f7c96dd6138494eada4e2fa206c30764ebe804c72ae170

  • SHA512

    593c314da82e8f2ce8be20c6e417461876ffd6d21e2fe6349cafaeb1b5504ff015c22758acb0f1c455093b06b539712ce5ef5546db67c57c94a0c955ed3a93d7

  • SSDEEP

    6144:ja+TodlGtN2juQvvkksGJ/WdXjkN+d1fwLnmNkJVUA33E0D5wj7WZ/NXeIa4VNtK:jkdGQvvcOkXjODnPUA3hwWB7ODTg05

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe2ed76a199e3e7213ca266b3c05d9f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe2ed76a199e3e7213ca266b3c05d9f0_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    PID:4672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4672-0-0x0000000001640000-0x0000000001642000-memory.dmp

    Filesize

    8KB

  • memory/4672-1-0x0000000001650000-0x0000000001651000-memory.dmp

    Filesize

    4KB

  • memory/4672-2-0x00000000017F0000-0x00000000017F1000-memory.dmp

    Filesize

    4KB

  • memory/4672-3-0x0000000001810000-0x0000000001811000-memory.dmp

    Filesize

    4KB

  • memory/4672-4-0x0000000001820000-0x0000000001821000-memory.dmp

    Filesize

    4KB

  • memory/4672-5-0x0000000001830000-0x0000000001831000-memory.dmp

    Filesize

    4KB

  • memory/4672-6-0x0000000003D70000-0x0000000003D96000-memory.dmp

    Filesize

    152KB

  • memory/4672-7-0x0000000001840000-0x0000000001841000-memory.dmp

    Filesize

    4KB

  • memory/4672-9-0x0000000001860000-0x0000000001861000-memory.dmp

    Filesize

    4KB

  • memory/4672-12-0x0000000001870000-0x0000000001871000-memory.dmp

    Filesize

    4KB

  • memory/4672-14-0x00000000022E0000-0x00000000022E1000-memory.dmp

    Filesize

    4KB

  • memory/4672-13-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/4672-15-0x0000000003D30000-0x0000000003D31000-memory.dmp

    Filesize

    4KB

  • memory/4672-17-0x0000000003D50000-0x0000000003D51000-memory.dmp

    Filesize

    4KB

  • memory/4672-16-0x0000000003D40000-0x0000000003D41000-memory.dmp

    Filesize

    4KB

  • memory/4672-18-0x0000000003D60000-0x0000000003D61000-memory.dmp

    Filesize

    4KB

  • memory/4672-19-0x0000000001850000-0x0000000001852000-memory.dmp

    Filesize

    8KB

  • memory/4672-20-0x0000000003DB0000-0x0000000003DB1000-memory.dmp

    Filesize

    4KB

  • memory/4672-22-0x0000000003DD0000-0x0000000003DD1000-memory.dmp

    Filesize

    4KB

  • memory/4672-21-0x0000000003DC0000-0x0000000003DC1000-memory.dmp

    Filesize

    4KB

  • memory/4672-25-0x0000000003DE0000-0x0000000003DE1000-memory.dmp

    Filesize

    4KB

  • memory/4672-26-0x0000000003DF0000-0x0000000003DF1000-memory.dmp

    Filesize

    4KB

  • memory/4672-28-0x0000000003E00000-0x0000000003E01000-memory.dmp

    Filesize

    4KB

  • memory/4672-30-0x0000000003E20000-0x0000000003E21000-memory.dmp

    Filesize

    4KB

  • memory/4672-29-0x0000000003E10000-0x0000000003E11000-memory.dmp

    Filesize

    4KB

  • memory/4672-31-0x0000000003DA0000-0x0000000003DA1000-memory.dmp

    Filesize

    4KB

  • memory/4672-32-0x0000000003E30000-0x0000000003E31000-memory.dmp

    Filesize

    4KB

  • memory/4672-33-0x0000000003E40000-0x0000000003E41000-memory.dmp

    Filesize

    4KB

  • memory/4672-34-0x00000000041A0000-0x00000000041A1000-memory.dmp

    Filesize

    4KB