Analysis

  • max time kernel
    130s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 12:55

General

  • Target

    3a386ad56d4b3ff8496f2e1898fe3426_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    3a386ad56d4b3ff8496f2e1898fe3426

  • SHA1

    7b460ac517baf0d8a4d3dfaa64e593965fc1794c

  • SHA256

    b9b190309c9bc2b718fdf7d6c186ef9a770e632404538412fff71addd1cc2556

  • SHA512

    b28d137138612bb3becbf29719693c064586493c92501fb50f9db6e9633bc85d252e5dc44d0e7ab38d44783391e277b811da342b2f2d53eb89e39b21a9556c68

  • SSDEEP

    24576:0iilWWab7BXfE6PgHdiXe7Xa33Zo3WSH9bbvfNe:0iil2XBXfEogHdiuLa3ib9vnA

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 20 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a386ad56d4b3ff8496f2e1898fe3426_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a386ad56d4b3ff8496f2e1898fe3426_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1136-0-0x0000000002BC0000-0x0000000002D96000-memory.dmp

    Filesize

    1.8MB

  • memory/1136-2-0x0000000002BC0000-0x0000000002D96000-memory.dmp

    Filesize

    1.8MB

  • memory/1136-3-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/1136-4-0x0000000000400000-0x0000000000D51000-memory.dmp

    Filesize

    9.3MB

  • memory/1136-5-0x0000000000400000-0x0000000000D51000-memory.dmp

    Filesize

    9.3MB

  • memory/1136-6-0x0000000000400000-0x0000000000D51000-memory.dmp

    Filesize

    9.3MB

  • memory/1136-7-0x0000000000400000-0x0000000000D51000-memory.dmp

    Filesize

    9.3MB

  • memory/1136-8-0x0000000002BC0000-0x0000000002D96000-memory.dmp

    Filesize

    1.8MB