Analysis

  • max time kernel
    92s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 03:30

General

  • Target

    2d1ed5a06717481a9822412313d3d455_JaffaCakes118.exe

  • Size

    703KB

  • MD5

    2d1ed5a06717481a9822412313d3d455

  • SHA1

    cee2b1fe3f1f435e3fc607cd28f0cf4db4d87d2c

  • SHA256

    21ffaecf06809de6901797a2b9fc599ffc6bf06a4f04560071433028ffb1a157

  • SHA512

    63c19a2131db1cc1860c87a5b69df23fafba9ba137cf96b6e812034549166f1cfa6c70df70aee27ef172693ed6a0d7205b0392e9b8a6192b8def018744c396ca

  • SSDEEP

    12288:YviyjlMsGhLqVjJ/gaTbiO/7hlS85TMalRU24LJgyo/30pFfhdC24WB:cYLqv/gaTbisSqrQL6yoQfhdC24WB

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d1ed5a06717481a9822412313d3d455_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d1ed5a06717481a9822412313d3d455_JaffaCakes118.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3632-2-0x0000000001560000-0x00000000016E1000-memory.dmp

    Filesize

    1.5MB

  • memory/3632-9-0x0000000001520000-0x0000000001521000-memory.dmp

    Filesize

    4KB

  • memory/3632-11-0x0000000001520000-0x0000000001521000-memory.dmp

    Filesize

    4KB