Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 14:08

General

  • Target

    09eaecd99f0260295c4761668a59dd21_JaffaCakes118.exe

  • Size

    395KB

  • MD5

    09eaecd99f0260295c4761668a59dd21

  • SHA1

    14bb0cfe64d79e3d7712bcf35a208d1f71048515

  • SHA256

    45376edce7e6a87f517f0e03166d2d29a8d41c778bb493bf9ca48bafba2972f5

  • SHA512

    c7c3282506822150b5bd239046c5140bd12135acc9e4a0d9250de867d293f0acbc40ab4c34bf139a28b26c12a217b0449be28233fde68eab32efae0ae38204d3

  • SSDEEP

    6144:gs833CnotE7RN8JmrwW9Na7coMGHUWO1a29gpclC2FVPbGm2Tle:mLtE7RafhJIag42HqY

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09eaecd99f0260295c4761668a59dd21_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\09eaecd99f0260295c4761668a59dd21_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    PID:2936

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Temp\sys32\$$FREE$$ .exe

          Filesize

          409KB

          MD5

          9fadb4e146e5c7f2963a076c5daacf25

          SHA1

          1f48e406a2c6614fb8a5a82af207a014babd701b

          SHA256

          eccccaeec9061f0995e828657fc4381a083c98631508a2f3bb86877cd8a1d526

          SHA512

          c5744e0126a425ca7cd7036917ec3d75f361658cc9063f8207ee9961265ee1f2956ea9b5c230f13473fa0c9ce7fed4bfbc84e16fe53e2ee28db409229ead482a

        • memory/2936-107-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-147-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-28-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-33-0x00000000002A0000-0x00000000002A1000-memory.dmp

          Filesize

          4KB

        • memory/2936-48-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-71-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-11-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-88-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-124-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-0-0x00000000002A0000-0x00000000002A1000-memory.dmp

          Filesize

          4KB

        • memory/2936-166-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-183-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-202-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-223-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-242-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/2936-261-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB