Analysis

  • max time kernel
    93s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 03:01

General

  • Target

    3261b832785018b2049974bb7ef7ff3d_JaffaCakes118.exe

  • Size

    131KB

  • MD5

    3261b832785018b2049974bb7ef7ff3d

  • SHA1

    507065d3f5fcdc7d055d852ff02ed1321ee174e9

  • SHA256

    3cbd0e2c83337c36a6a7ac39947111ea2f758ec34a5a30186a0d460b287e040b

  • SHA512

    c19358a510b3fcbb35baeaafbe678a792414ea4fc15980c9058c72d38c77120921b0af6ccb7efeaff551f48c0d528cb4c7d9684bd624b7052b74740d79144bc2

  • SSDEEP

    1536:xluaBrSh5cTv32SDzZ865vc/7usP5KyS532Sh0BjB72Y9sFV:iaBrK5+uSt5vc/JP5Kt532XBjB72Y2v

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3261b832785018b2049974bb7ef7ff3d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3261b832785018b2049974bb7ef7ff3d_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4752-0-0x00007FFE7B8E3000-0x00007FFE7B8E5000-memory.dmp

    Filesize

    8KB

  • memory/4752-1-0x00000000003A0000-0x00000000003C6000-memory.dmp

    Filesize

    152KB

  • memory/4752-2-0x0000000000C70000-0x0000000000C7A000-memory.dmp

    Filesize

    40KB

  • memory/4752-3-0x0000000002530000-0x0000000002538000-memory.dmp

    Filesize

    32KB