Analysis

  • max time kernel
    55s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 22:38

General

  • Target

    03c95827e71250a7aa7f16d115ebc9ca_JaffaCakes118.exe

  • Size

    378KB

  • MD5

    03c95827e71250a7aa7f16d115ebc9ca

  • SHA1

    ddeebf3bb5bbe3ac9801c1f6a0f48d6c05959f74

  • SHA256

    a6c90d5eed643f83eff48c9c16cb4ffbcf56566a6adfe74161b0cb711981fc2c

  • SHA512

    f66dc6bdb880721bfca577060f0a90daede5827eca3df9bfbc0eedc014de5027682efef1f4e7fd4c0310e237013dda4f27fc458c67ecb5225c14caa6a25527e2

  • SSDEEP

    6144:cnz/rFH4WhEWnmIgM2euYlUinOhLPnKlMbbsSocQxPOscF4oDQ1JZiId:U5H4WhEWnUc2/KlMaH0Id

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c95827e71250a7aa7f16d115ebc9ca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03c95827e71250a7aa7f16d115ebc9ca_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Drops file in Windows directory
    PID:4000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4000-0-0x0000000001760000-0x0000000001761000-memory.dmp

    Filesize

    4KB

  • memory/4000-13-0x0000000001960000-0x0000000001961000-memory.dmp

    Filesize

    4KB

  • memory/4000-12-0x0000000001940000-0x0000000001941000-memory.dmp

    Filesize

    4KB

  • memory/4000-11-0x0000000001930000-0x0000000001931000-memory.dmp

    Filesize

    4KB

  • memory/4000-10-0x0000000001920000-0x0000000001921000-memory.dmp

    Filesize

    4KB

  • memory/4000-9-0x0000000001910000-0x0000000001911000-memory.dmp

    Filesize

    4KB

  • memory/4000-17-0x0000000004120000-0x0000000004121000-memory.dmp

    Filesize

    4KB

  • memory/4000-16-0x0000000004110000-0x0000000004111000-memory.dmp

    Filesize

    4KB

  • memory/4000-15-0x0000000004100000-0x0000000004101000-memory.dmp

    Filesize

    4KB

  • memory/4000-14-0x00000000040F0000-0x00000000040F1000-memory.dmp

    Filesize

    4KB

  • memory/4000-8-0x0000000001900000-0x0000000001901000-memory.dmp

    Filesize

    4KB

  • memory/4000-7-0x00000000018F0000-0x00000000018F1000-memory.dmp

    Filesize

    4KB

  • memory/4000-6-0x00000000018D0000-0x00000000018D1000-memory.dmp

    Filesize

    4KB

  • memory/4000-5-0x0000000001880000-0x0000000001881000-memory.dmp

    Filesize

    4KB

  • memory/4000-4-0x0000000001870000-0x0000000001871000-memory.dmp

    Filesize

    4KB

  • memory/4000-3-0x0000000001860000-0x0000000001861000-memory.dmp

    Filesize

    4KB

  • memory/4000-2-0x0000000001850000-0x0000000001851000-memory.dmp

    Filesize

    4KB

  • memory/4000-18-0x0000000004130000-0x0000000004131000-memory.dmp

    Filesize

    4KB

  • memory/4000-19-0x0000000004170000-0x0000000004171000-memory.dmp

    Filesize

    4KB

  • memory/4000-1-0x0000000001820000-0x0000000001821000-memory.dmp

    Filesize

    4KB

  • memory/4000-20-0x0000000005240000-0x0000000005241000-memory.dmp

    Filesize

    4KB

  • memory/4000-22-0x0000000004140000-0x000000000416F000-memory.dmp

    Filesize

    188KB

  • memory/4000-26-0x0000000005AE0000-0x0000000005AE1000-memory.dmp

    Filesize

    4KB

  • memory/4000-25-0x0000000005260000-0x0000000005261000-memory.dmp

    Filesize

    4KB