Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 15:03

General

  • Target

    2a87de3ee7820cd6fd4a3ad608f7c864_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    2a87de3ee7820cd6fd4a3ad608f7c864

  • SHA1

    db94ba01bd6d0cc947ba8b149796ec2068d9393b

  • SHA256

    a49de6efb90b20719422065af99a4ac694761639281da4ab7cbdc88c994cae15

  • SHA512

    09932d6d7710cb4af90f7f55159e45f1107449eff9336665d64424c9a58140f6686fd480aa4ae0c7f30ccda6708f915dfae41b71eea1de254cd818e07f05a92b

  • SSDEEP

    24576:StE7RayN03g5qcIFtLEO1XfSeIzqTY68IlILWlHpEj14SvSE/pdc:cYw9Q0J51XHeqrlppEj1Bzc

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a87de3ee7820cd6fd4a3ad608f7c864_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a87de3ee7820cd6fd4a3ad608f7c864_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    PID:1076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\sys32\$$FREE$$ .exe

    Filesize

    2.4MB

    MD5

    1c737a8f052ef7c69609104052734772

    SHA1

    dbcf1cd74a6a77a09eb51c3552a1a60b619b70ab

    SHA256

    edc692c7ea945d6581a3e9daaa071bfb5cd82282aec5f396963e7e2d83f20116

    SHA512

    5c0f5e9f2c0fcad3b0c266afe4eb9b13998422ac38508309b213451c6ab5d500200f523d5372cdbff8c869f1ce89e166184feaea52cddba84f82ef3593a8570c

  • memory/1076-107-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-143-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-28-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-35-0x00000000006E0000-0x00000000006E1000-memory.dmp

    Filesize

    4KB

  • memory/1076-48-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-65-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-11-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-88-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-124-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-0-0x00000000006E0000-0x00000000006E1000-memory.dmp

    Filesize

    4KB

  • memory/1076-164-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-183-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-202-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-223-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-242-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1076-259-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB