Analysis

  • max time kernel
    136s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 20:55

General

  • Target

    64bd2f10d23546457727fa5236217d06_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    64bd2f10d23546457727fa5236217d06

  • SHA1

    195f99d4f318b311c38dd2bedadd427361f552aa

  • SHA256

    6d1f5160fd581f155155e63457bd652c47627f607215a6c82c0cd218c3aed51c

  • SHA512

    3d7ac632f3f856a2d80f9c8ef12a7a364c6a98df3d569d40a5df6f0b15251ff1fa1541b4b516d818e4faf699b5e9eec9b9165e85f14cfd7603c1a1a90c84353f

  • SSDEEP

    24576:lWxhHS/BqXw8fAn4ouMfKDmrSuc8hbq04HotXXjUtPkF1WjMxyspg8P:HWTI0AnrSeS0j1NxyTo

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64bd2f10d23546457727fa5236217d06_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\64bd2f10d23546457727fa5236217d06_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:5780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5780-0-0x00007FFA03B65000-0x00007FFA03B66000-memory.dmp

    Filesize

    4KB

  • memory/5780-1-0x00007FFA038B0000-0x00007FFA04251000-memory.dmp

    Filesize

    9.6MB

  • memory/5780-12-0x000000001C3C0000-0x000000001C8CE000-memory.dmp

    Filesize

    5.1MB

  • memory/5780-13-0x000000001CDA0000-0x000000001D26E000-memory.dmp

    Filesize

    4.8MB

  • memory/5780-14-0x000000001D6A0000-0x000000001D74A000-memory.dmp

    Filesize

    680KB

  • memory/5780-17-0x00007FFA038B0000-0x00007FFA04251000-memory.dmp

    Filesize

    9.6MB

  • memory/5780-18-0x000000001D8E0000-0x000000001D942000-memory.dmp

    Filesize

    392KB

  • memory/5780-19-0x000000001D9F0000-0x000000001DA8C000-memory.dmp

    Filesize

    624KB

  • memory/5780-20-0x0000000000F60000-0x0000000000F68000-memory.dmp

    Filesize

    32KB

  • memory/5780-21-0x00007FFA038B0000-0x00007FFA04251000-memory.dmp

    Filesize

    9.6MB

  • memory/5780-22-0x00007FFA038B0000-0x00007FFA04251000-memory.dmp

    Filesize

    9.6MB

  • memory/5780-23-0x00007FFA038B0000-0x00007FFA04251000-memory.dmp

    Filesize

    9.6MB

  • memory/5780-24-0x00007FFA038B0000-0x00007FFA04251000-memory.dmp

    Filesize

    9.6MB

  • memory/5780-25-0x00007FFA03B65000-0x00007FFA03B66000-memory.dmp

    Filesize

    4KB