Analysis

  • max time kernel
    137s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 21:34

General

  • Target

    21d0980e6a17e656fc0b739589ea11ea_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    21d0980e6a17e656fc0b739589ea11ea

  • SHA1

    42289dc0e38b32c304238894b7fbc05ebcbc715a

  • SHA256

    1f4c6b1472276baa6992f81ae7b20e52c0dc47df24eb7323d65e8689f19ba706

  • SHA512

    2768c458fd14cf449b629d3808442a014b0b905106e6fe0d5420c3efa7a38f61a6e6c112eb872df80de00e9b786e8d2f42f9ff6dda4638196086108a949ae977

  • SSDEEP

    24576:gdw0NzmaEIasRhJBA8wuFuqkevuaV0iZuMWrwmwS:gdwIzmtHsrqu0+ua2IuM7mwS

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 20 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21d0980e6a17e656fc0b739589ea11ea_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\21d0980e6a17e656fc0b739589ea11ea_JaffaCakes118.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1260

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1260-0-0x00000000011B0000-0x00000000012F7000-memory.dmp

          Filesize

          1.3MB

        • memory/1260-2-0x00000000011B0000-0x00000000012F7000-memory.dmp

          Filesize

          1.3MB

        • memory/1260-3-0x0000000000401000-0x0000000000402000-memory.dmp

          Filesize

          4KB

        • memory/1260-4-0x0000000000400000-0x0000000000CBD000-memory.dmp

          Filesize

          8.7MB

        • memory/1260-5-0x0000000000400000-0x0000000000CBD000-memory.dmp

          Filesize

          8.7MB

        • memory/1260-6-0x0000000000400000-0x0000000000CBD000-memory.dmp

          Filesize

          8.7MB

        • memory/1260-8-0x00000000011B0000-0x00000000012F7000-memory.dmp

          Filesize

          1.3MB

        • memory/1260-7-0x0000000000400000-0x0000000000CBD000-memory.dmp

          Filesize

          8.7MB