Analysis

  • max time kernel
    66s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 01:07

General

  • Target

    040bab344b62082de2ca506bf5e83994_JaffaCakes118.exe

  • Size

    992KB

  • MD5

    040bab344b62082de2ca506bf5e83994

  • SHA1

    6a519eed66f9cbdb428267dd72e6da79f77578c2

  • SHA256

    c0a96b4324ffa2c94b75161244cc742851d8fd969a95897446b0e8caa4d941bb

  • SHA512

    ac256f46f3931fac0671e508ca4d41650230be216ec0cc4a25962467cc3ad2bfe2f63732abf19943d9bad71d8047e4b14c526a5c5cce133b0ba2e18c17a18776

  • SSDEEP

    24576:4kZRCdWt0hLZdDPBhqPMvQIuLgsRIXAXI6qkN:4GRaWShLZxLuwCYXAtH

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\040bab344b62082de2ca506bf5e83994_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\040bab344b62082de2ca506bf5e83994_JaffaCakes118.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/876-0-0x0000000000E00000-0x0000000000E05000-memory.dmp

    Filesize

    20KB

  • memory/876-1-0x0000000000F10000-0x0000000000F11000-memory.dmp

    Filesize

    4KB

  • memory/876-4-0x0000000000F20000-0x0000000000F21000-memory.dmp

    Filesize

    4KB

  • memory/876-5-0x0000000003310000-0x0000000003441000-memory.dmp

    Filesize

    1.2MB

  • memory/876-12-0x0000000076020000-0x0000000076110000-memory.dmp

    Filesize

    960KB

  • memory/876-13-0x0000000003130000-0x0000000003131000-memory.dmp

    Filesize

    4KB

  • memory/876-14-0x00000000031A0000-0x00000000031A1000-memory.dmp

    Filesize

    4KB

  • memory/876-22-0x0000000076020000-0x0000000076110000-memory.dmp

    Filesize

    960KB

  • memory/876-23-0x00000000031A0000-0x00000000031A1000-memory.dmp

    Filesize

    4KB