Analysis

  • max time kernel
    139s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 22:42

General

  • Target

    612c12788dd37e1c7a6bfbab026bcb99_JaffaCakes118.exe

  • Size

    452KB

  • MD5

    612c12788dd37e1c7a6bfbab026bcb99

  • SHA1

    cda4c2274ee50f961b522507b90cb64204b357b5

  • SHA256

    22ac536e8ca0259d760848ffea9d42b7a04547136a89098ade6f21b114867edb

  • SHA512

    e23b72580860b8b88922ec95bddbb904789cd389ebebafbf968e12677b7781700a53e08f63c5a27a082a3c1ffb47a8d34774d46c2f8c20e3015e08bf705caca6

  • SSDEEP

    6144:3a+TodlGtN2juQvvkksGJ/WdXjkN+d1fwLnmNkJVUA3OE0D5wj7WZ/NXeIa4VNtW:3kdGQvvcOkXjODnPUA3SwWB7oVf

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\612c12788dd37e1c7a6bfbab026bcb99_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\612c12788dd37e1c7a6bfbab026bcb99_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    PID:744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/744-0-0x00000000004F0000-0x00000000004F2000-memory.dmp

    Filesize

    8KB

  • memory/744-1-0x0000000000500000-0x0000000000501000-memory.dmp

    Filesize

    4KB

  • memory/744-8-0x0000000001430000-0x0000000001431000-memory.dmp

    Filesize

    4KB

  • memory/744-16-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/744-15-0x0000000003270000-0x0000000003271000-memory.dmp

    Filesize

    4KB

  • memory/744-14-0x0000000000DC0000-0x0000000000DC2000-memory.dmp

    Filesize

    8KB

  • memory/744-13-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/744-12-0x0000000003250000-0x0000000003251000-memory.dmp

    Filesize

    4KB

  • memory/744-11-0x0000000003240000-0x0000000003241000-memory.dmp

    Filesize

    4KB

  • memory/744-10-0x0000000003230000-0x0000000003231000-memory.dmp

    Filesize

    4KB

  • memory/744-9-0x0000000003220000-0x0000000003221000-memory.dmp

    Filesize

    4KB

  • memory/744-7-0x0000000001420000-0x0000000001421000-memory.dmp

    Filesize

    4KB

  • memory/744-6-0x0000000000D70000-0x0000000000D71000-memory.dmp

    Filesize

    4KB

  • memory/744-5-0x0000000000D60000-0x0000000000D61000-memory.dmp

    Filesize

    4KB

  • memory/744-4-0x0000000000C50000-0x0000000000C51000-memory.dmp

    Filesize

    4KB

  • memory/744-3-0x0000000000C40000-0x0000000000C41000-memory.dmp

    Filesize

    4KB

  • memory/744-2-0x0000000000C20000-0x0000000000C21000-memory.dmp

    Filesize

    4KB

  • memory/744-23-0x0000000003290000-0x00000000032B6000-memory.dmp

    Filesize

    152KB

  • memory/744-22-0x0000000003320000-0x0000000003321000-memory.dmp

    Filesize

    4KB

  • memory/744-21-0x0000000003310000-0x0000000003311000-memory.dmp

    Filesize

    4KB

  • memory/744-28-0x0000000003340000-0x0000000003341000-memory.dmp

    Filesize

    4KB

  • memory/744-30-0x0000000003360000-0x0000000003361000-memory.dmp

    Filesize

    4KB

  • memory/744-29-0x00000000032E0000-0x00000000032E1000-memory.dmp

    Filesize

    4KB

  • memory/744-27-0x0000000003330000-0x0000000003331000-memory.dmp

    Filesize

    4KB

  • memory/744-20-0x0000000003300000-0x0000000003301000-memory.dmp

    Filesize

    4KB

  • memory/744-19-0x00000000032F0000-0x00000000032F1000-memory.dmp

    Filesize

    4KB

  • memory/744-18-0x0000000003280000-0x0000000003281000-memory.dmp

    Filesize

    4KB

  • memory/744-17-0x00000000032D0000-0x00000000032D1000-memory.dmp

    Filesize

    4KB

  • memory/744-33-0x0000000003350000-0x0000000003351000-memory.dmp

    Filesize

    4KB