Analysis

  • max time kernel
    135s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:24

General

  • Target

    68fd3cbfe45ea12f7783d8184eeb8381_JaffaCakes118.exe

  • Size

    350KB

  • MD5

    68fd3cbfe45ea12f7783d8184eeb8381

  • SHA1

    232ea65b875637c55ac70b461aa7b14c19c2d7cf

  • SHA256

    204c1236b3dfb84966f222ea5d6581722bcabb807dacb49946dd8fd1243bd44e

  • SHA512

    f568c183347045e365b85905ccaec9b1b20237dd4d67c8664bed007c09391f03a4b1ee4370e232ea5843bbd5b98cda00f453421c1375af02f0bf96fa73618eb5

  • SSDEEP

    6144:69/HVfRD8RAQW914ot3vvl+RTcTXepQfWND6u3SFI5zSvYN7Lz:65HV5D8z2BvkRTPdN7Lz

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\68fd3cbfe45ea12f7783d8184eeb8381_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\68fd3cbfe45ea12f7783d8184eeb8381_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Drops file in Windows directory
    PID:4500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4500-0-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/4500-14-0x0000000000A20000-0x0000000000A21000-memory.dmp

    Filesize

    4KB

  • memory/4500-13-0x00000000009E0000-0x00000000009E1000-memory.dmp

    Filesize

    4KB

  • memory/4500-12-0x0000000000A10000-0x0000000000A11000-memory.dmp

    Filesize

    4KB

  • memory/4500-11-0x0000000000A00000-0x0000000000A01000-memory.dmp

    Filesize

    4KB

  • memory/4500-19-0x0000000000A80000-0x0000000000A81000-memory.dmp

    Filesize

    4KB

  • memory/4500-18-0x0000000000A70000-0x0000000000A71000-memory.dmp

    Filesize

    4KB

  • memory/4500-17-0x0000000000A60000-0x0000000000A61000-memory.dmp

    Filesize

    4KB

  • memory/4500-16-0x0000000000A50000-0x0000000000A51000-memory.dmp

    Filesize

    4KB

  • memory/4500-15-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/4500-10-0x00000000009F0000-0x00000000009F1000-memory.dmp

    Filesize

    4KB

  • memory/4500-9-0x00000000009D0000-0x00000000009D1000-memory.dmp

    Filesize

    4KB

  • memory/4500-8-0x00000000009C0000-0x00000000009C1000-memory.dmp

    Filesize

    4KB

  • memory/4500-7-0x0000000000880000-0x0000000000881000-memory.dmp

    Filesize

    4KB

  • memory/4500-6-0x0000000000870000-0x0000000000871000-memory.dmp

    Filesize

    4KB

  • memory/4500-5-0x0000000000820000-0x0000000000821000-memory.dmp

    Filesize

    4KB

  • memory/4500-4-0x0000000000810000-0x0000000000811000-memory.dmp

    Filesize

    4KB

  • memory/4500-3-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/4500-2-0x00000000007F0000-0x00000000007F1000-memory.dmp

    Filesize

    4KB

  • memory/4500-1-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/4500-21-0x00000000014F0000-0x000000000151F000-memory.dmp

    Filesize

    188KB

  • memory/4500-20-0x0000000000A90000-0x0000000000A91000-memory.dmp

    Filesize

    4KB

  • memory/4500-25-0x0000000003AA0000-0x0000000003AA1000-memory.dmp

    Filesize

    4KB

  • memory/4500-26-0x0000000003EF0000-0x0000000003EF1000-memory.dmp

    Filesize

    4KB

  • memory/4500-42-0x0000000002D40000-0x0000000002D41000-memory.dmp

    Filesize

    4KB