Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 01:58

General

  • Target

    5c9a3e2e9635d8b38bf3f0fd638d5cd1_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    5c9a3e2e9635d8b38bf3f0fd638d5cd1

  • SHA1

    6f09cbcf123b6d8fbea72ac166d4ec3e2c77e5fd

  • SHA256

    88dbb7747b3e745b06bdf00aec794f5acfc3a743ef12b61916b5dbc7f00d86eb

  • SHA512

    a8ca687ed7d9eedbeb7e231e558d35b9ed7aa42738df1dab0f5222172f9d2ebd77ddfa682235967cd7bf1b6ae32d6a3929c2ea1ba66ff0ed7ce373564e0dc423

  • SSDEEP

    24576:/Kso+gdfuiheyvABbJ1n+TtDdR1Y1Von3CTwar+7qeM9:/OuCehwTtoVon3CTwar5

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c9a3e2e9635d8b38bf3f0fd638d5cd1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5c9a3e2e9635d8b38bf3f0fd638d5cd1_JaffaCakes118.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2876

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2876-1-0x0000000000A80000-0x0000000000A81000-memory.dmp

          Filesize

          4KB

        • memory/2876-0-0x0000000000A70000-0x0000000000A71000-memory.dmp

          Filesize

          4KB

        • memory/2876-4-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

          Filesize

          4KB

        • memory/2876-3-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

          Filesize

          4KB

        • memory/2876-2-0x0000000000A90000-0x0000000000A91000-memory.dmp

          Filesize

          4KB

        • memory/2876-5-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

          Filesize

          4KB

        • memory/2876-6-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

          Filesize

          4KB

        • memory/2876-9-0x0000000000B40000-0x0000000000B41000-memory.dmp

          Filesize

          4KB

        • memory/2876-8-0x0000000000B00000-0x0000000000B01000-memory.dmp

          Filesize

          4KB

        • memory/2876-7-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

          Filesize

          4KB

        • memory/2876-10-0x00000000033E0000-0x00000000033E2000-memory.dmp

          Filesize

          8KB

        • memory/2876-11-0x00000000034A0000-0x00000000034A2000-memory.dmp

          Filesize

          8KB

        • memory/2876-12-0x00000000034B0000-0x00000000034B2000-memory.dmp

          Filesize

          8KB

        • memory/2876-13-0x0000000003730000-0x0000000003732000-memory.dmp

          Filesize

          8KB

        • memory/2876-16-0x0000000003B60000-0x0000000003C8A000-memory.dmp

          Filesize

          1.2MB