Analysis

  • max time kernel
    130s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:49

General

  • Target

    690cf59c30991d6ee5fc75cd4706c61b_JaffaCakes118.exe

  • Size

    370KB

  • MD5

    690cf59c30991d6ee5fc75cd4706c61b

  • SHA1

    46bba01379ae65c0fe6ca7deb3628e6367a59eec

  • SHA256

    054dc42a4de9f0a3698b2f8c23d29025b36821730e62888b7987e84e706577fc

  • SHA512

    6b05b89951e5f4e67c0ae394820d8b8d8013cf1116125f625b1cf7211fc621f6d9e11fa1425a07fedb262c464ee664077d41db0c66e3fc1a6c1f20b37a654639

  • SSDEEP

    6144:8FMk4uj8ZGPiq1/GKiHr22+luDAzE8WJt/Kis0liuKiXeMt89QKZx3R6gxUCK+vx:8FM88Zuiq1/Gf22ZCbWv9I5FBx

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\690cf59c30991d6ee5fc75cd4706c61b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\690cf59c30991d6ee5fc75cd4706c61b_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    PID:4896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4896-0-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB

  • memory/4896-2-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB

  • memory/4896-1-0x0000000000760000-0x0000000000762000-memory.dmp

    Filesize

    8KB

  • memory/4896-11-0x0000000000E70000-0x0000000000E72000-memory.dmp

    Filesize

    8KB

  • memory/4896-17-0x0000000001090000-0x0000000001091000-memory.dmp

    Filesize

    4KB

  • memory/4896-16-0x0000000001080000-0x0000000001081000-memory.dmp

    Filesize

    4KB

  • memory/4896-15-0x0000000001070000-0x0000000001071000-memory.dmp

    Filesize

    4KB

  • memory/4896-14-0x0000000001060000-0x0000000001061000-memory.dmp

    Filesize

    4KB

  • memory/4896-13-0x0000000001050000-0x0000000001051000-memory.dmp

    Filesize

    4KB

  • memory/4896-12-0x0000000001030000-0x0000000001031000-memory.dmp

    Filesize

    4KB

  • memory/4896-19-0x0000000001240000-0x000000000126C000-memory.dmp

    Filesize

    176KB

  • memory/4896-30-0x0000000003580000-0x0000000003581000-memory.dmp

    Filesize

    4KB

  • memory/4896-29-0x0000000003590000-0x0000000003591000-memory.dmp

    Filesize

    4KB

  • memory/4896-28-0x0000000003560000-0x0000000003561000-memory.dmp

    Filesize

    4KB

  • memory/4896-27-0x0000000003570000-0x0000000003571000-memory.dmp

    Filesize

    4KB

  • memory/4896-26-0x0000000003550000-0x0000000003551000-memory.dmp

    Filesize

    4KB

  • memory/4896-25-0x0000000001290000-0x0000000001291000-memory.dmp

    Filesize

    4KB

  • memory/4896-24-0x0000000001270000-0x0000000001271000-memory.dmp

    Filesize

    4KB

  • memory/4896-23-0x0000000001280000-0x0000000001281000-memory.dmp

    Filesize

    4KB

  • memory/4896-22-0x0000000001040000-0x0000000001041000-memory.dmp

    Filesize

    4KB

  • memory/4896-10-0x0000000001020000-0x0000000001021000-memory.dmp

    Filesize

    4KB

  • memory/4896-9-0x0000000001010000-0x0000000001011000-memory.dmp

    Filesize

    4KB

  • memory/4896-8-0x0000000000E90000-0x0000000000E91000-memory.dmp

    Filesize

    4KB

  • memory/4896-7-0x0000000000E60000-0x0000000000E61000-memory.dmp

    Filesize

    4KB

  • memory/4896-6-0x0000000000E50000-0x0000000000E51000-memory.dmp

    Filesize

    4KB

  • memory/4896-5-0x0000000000E40000-0x0000000000E41000-memory.dmp

    Filesize

    4KB

  • memory/4896-4-0x0000000000E30000-0x0000000000E31000-memory.dmp

    Filesize

    4KB

  • memory/4896-3-0x00000000007F0000-0x00000000007F1000-memory.dmp

    Filesize

    4KB