Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/05/2024, 13:25

General

  • Target

    12ee67e875bc117cd1c847e712717dce_JaffaCakes118.exe

  • Size

    454KB

  • MD5

    12ee67e875bc117cd1c847e712717dce

  • SHA1

    d67661204ee7888f52105556ae4e1500c05a60e4

  • SHA256

    240e87c69101e0d1d28d892d2517fe26ae00839c8ed70688d9e9a222452f19f6

  • SHA512

    d5d7c528bb26018e508404eb83c32f19d70cf04a22e3b733922162c08299241ca33a142665528350fe4afb03bde8e48e1f3bf3df1141541c946d8e9f13bc663e

  • SSDEEP

    6144:IiFPtvyUFt7CcI8laB2sBMy1cEShXcKS2y38l1dFtGQxf3Rt9xmNGtfHEC:lFrqcAnBKE4l1dFtGQz2Ij

Score
1/10

Malware Config

Signatures

  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12ee67e875bc117cd1c847e712717dce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\12ee67e875bc117cd1c847e712717dce_JaffaCakes118.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:4784
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3128

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4784-0-0x00000000750C2000-0x00000000750C3000-memory.dmp

            Filesize

            4KB

          • memory/4784-1-0x00000000750C0000-0x0000000075671000-memory.dmp

            Filesize

            5.7MB

          • memory/4784-2-0x00000000750C0000-0x0000000075671000-memory.dmp

            Filesize

            5.7MB

          • memory/4784-17-0x00000000750C0000-0x0000000075671000-memory.dmp

            Filesize

            5.7MB