Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 13:17

General

  • Target

    2f4b9b7e83e381acfe5766f9b29980d9_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    2f4b9b7e83e381acfe5766f9b29980d9

  • SHA1

    02ff99f0a3d84336fb8d72a41ecf5a43c5c5b407

  • SHA256

    2e71014bb202a891ed9a97790fb584ab375323aa5a345062d7f782106d286315

  • SHA512

    8ae007fd12b71922d8dfe30183142b7ef82e93f056a18c9e2f69ebc85d935e64b2ebcc9947581e94a6afad3308ff0007972216c2956c03220d4322d7472966c2

  • SSDEEP

    49152:kVxm+FI5Tq9Zri28csLVw+dZwDe/K7gDJLReX7:kVxm9dq7iXLVzdiMK0LRi7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f4b9b7e83e381acfe5766f9b29980d9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2f4b9b7e83e381acfe5766f9b29980d9_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Users\Admin\AppData\Local\Temp\INS6522.tmp
      C:\Users\Admin\AppData\Local\Temp\INS6522.tmp /SL3 $A0066 C:\Users\Admin\AppData\Local\Temp\2f4b9b7e83e381acfe5766f9b29980d9_JaffaCakes118.exe 1657934 1661355 61952
      2⤵
      • Executes dropped EXE
      PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\INS6522.tmp

    Filesize

    377KB

    MD5

    4a1144781f651ec86dbbb099dcdc437a

    SHA1

    15c349ef7ca856986cadd4f2d473004a039ba8e1

    SHA256

    20ad8066d677f6661d00a1ed2c881eaee38b1cf8def951d770207cb3ee7f1418

    SHA512

    29d84ea827b6f4b441d099798629f239e880d0c9325bf0c6bd5a1d833b0a80dc0ed88c65cf819fa37b96c0f7eedc9547ab4413250275e3493d811e721dd946ce

  • memory/548-8-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5052-5-0x00000000021B0000-0x00000000021B1000-memory.dmp

    Filesize

    4KB

  • memory/5052-9-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/5052-13-0x00000000021B0000-0x00000000021B1000-memory.dmp

    Filesize

    4KB