Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 10:38

General

  • Target

    5ea2377bbb228ca99f21e33f278f66d8_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    5ea2377bbb228ca99f21e33f278f66d8

  • SHA1

    92443c127ee3b2a05e294adb39063e04f3cf0e5d

  • SHA256

    f30abd5d0148d9e37b1651f9008af929e68b12c0ac7db956a2f61606179a7a98

  • SHA512

    f928022199de2dd1d899883e54b94408936b2c39e556de14dab38e0eb5aa1fe990a71d688bbd98f1cf74170ab5be0d0464ac6750581ce202436ccc2b79a1ad0c

  • SSDEEP

    24576:pvLvfClBigKnGgyjbw3MCFbOAfdxv/UWKH80:pvTvlGdbqHzv/Y

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 20 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ea2377bbb228ca99f21e33f278f66d8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5ea2377bbb228ca99f21e33f278f66d8_JaffaCakes118.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1780-0-0x0000000002970000-0x0000000002A6F000-memory.dmp

    Filesize

    1020KB

  • memory/1780-2-0x0000000002970000-0x0000000002A6F000-memory.dmp

    Filesize

    1020KB

  • memory/1780-4-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/1780-3-0x0000000002970000-0x0000000002A6F000-memory.dmp

    Filesize

    1020KB

  • memory/1780-5-0x0000000000400000-0x0000000000CFC000-memory.dmp

    Filesize

    9.0MB

  • memory/1780-6-0x0000000000400000-0x0000000000CFC000-memory.dmp

    Filesize

    9.0MB

  • memory/1780-7-0x0000000000400000-0x0000000000CFC000-memory.dmp

    Filesize

    9.0MB

  • memory/1780-8-0x0000000000400000-0x0000000000CFC000-memory.dmp

    Filesize

    9.0MB

  • memory/1780-9-0x0000000002970000-0x0000000002A6F000-memory.dmp

    Filesize

    1020KB