Analysis

  • max time kernel
    134s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2024, 21:14

General

  • Target

    3c9a68024b969a0035973e8bec1a339d_JaffaCakes118.exe

  • Size

    599KB

  • MD5

    3c9a68024b969a0035973e8bec1a339d

  • SHA1

    9af9293d23341bb1826463d659661fa2ebb8da07

  • SHA256

    123ada8690f4f47bb480dab0f8bd5af2a7d549b7c0e0cdc5596b2f0b3b0fbb06

  • SHA512

    44bf09658e80f20923f49f3713c3ea0a2ecf82b19dbcd3de68a4d546321a2425ee19483d776a16feb0b6d5c3162707d9d7ecc768c3e224a5b75d89668f0823aa

  • SSDEEP

    12288:HbLYszYvbyqCyHsAVvs3twVgmpYRZJLDVHQEBGNh1m3q0IT:HqGqCl3SVgmaRZPwjb1uq0IT

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c9a68024b969a0035973e8bec1a339d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c9a68024b969a0035973e8bec1a339d_JaffaCakes118.exe"
    1⤵
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3c9a68024b969a0035973e8bec1a339d_JaffaCakes118.exe:typelib

    Filesize

    8KB

    MD5

    784ecebdc78fa2bdfba195ae19f9eaeb

    SHA1

    b667f761b8e977d6ac540b45842aab83bf0e72b2

    SHA256

    d4b66bf77f0814dc5716596b9f6b4ffe17f5f3c6661c061bd5278bd6093e403d

    SHA512

    7f01e994bc75d0e1ae6d6b8026dacce7396e638109de693917b29785be3b8cb78ab340f2ec9b967599639084e512f354bc2cb679b63e1f34164874325a5ba949

  • memory/880-0-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/880-7-0x0000000000360000-0x00000000004E3000-memory.dmp

    Filesize

    1.5MB

  • memory/880-14-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/880-15-0x0000000000360000-0x00000000004E3000-memory.dmp

    Filesize

    1.5MB