Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 03:36

General

  • Target

    65df51aa7208fd7ffb767150ab619a15_JaffaCakes118.exe

  • Size

    456KB

  • MD5

    65df51aa7208fd7ffb767150ab619a15

  • SHA1

    81a9f64d0f0fa868da22498b1bba601330f54f7a

  • SHA256

    125a334434d01dcc72c332043bbc169c1ded215d70468df773cb41b01821ea64

  • SHA512

    632f656cb38d68facf18413607713449d1ec06c1655520fa6d7b43febaf571a7baa68412b03ad2d4b1d429b2bb2c8ac8dfd67f46699e2f011f7b111fe7a9ea03

  • SSDEEP

    6144:rhu/hlKM5aYHU4DHN38C499Qydb2bsHkHD+vU4EMz1rUlaos04euydV82KwxtGtl:roCE7FZI9RNHkHhnraZeethNcK

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\65df51aa7208fd7ffb767150ab619a15_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65df51aa7208fd7ffb767150ab619a15_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    PID:4884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4884-0-0x00000000009F0000-0x00000000009F1000-memory.dmp

    Filesize

    4KB

  • memory/4884-1-0x00000000011B0000-0x00000000011B2000-memory.dmp

    Filesize

    8KB

  • memory/4884-3-0x0000000001670000-0x0000000001671000-memory.dmp

    Filesize

    4KB

  • memory/4884-2-0x00000000011C0000-0x00000000011C1000-memory.dmp

    Filesize

    4KB

  • memory/4884-7-0x00000000016C0000-0x00000000016C1000-memory.dmp

    Filesize

    4KB

  • memory/4884-15-0x0000000001710000-0x0000000001712000-memory.dmp

    Filesize

    8KB

  • memory/4884-14-0x00000000036F0000-0x00000000036F1000-memory.dmp

    Filesize

    4KB

  • memory/4884-13-0x00000000036E0000-0x00000000036E1000-memory.dmp

    Filesize

    4KB

  • memory/4884-12-0x00000000036D0000-0x00000000036D1000-memory.dmp

    Filesize

    4KB

  • memory/4884-11-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/4884-10-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/4884-8-0x0000000001720000-0x0000000001721000-memory.dmp

    Filesize

    4KB

  • memory/4884-23-0x0000000003760000-0x0000000003761000-memory.dmp

    Filesize

    4KB

  • memory/4884-22-0x00000000037A0000-0x00000000037A1000-memory.dmp

    Filesize

    4KB

  • memory/4884-31-0x00000000037E0000-0x00000000037E1000-memory.dmp

    Filesize

    4KB

  • memory/4884-30-0x00000000037D0000-0x00000000037D1000-memory.dmp

    Filesize

    4KB

  • memory/4884-29-0x00000000037C0000-0x00000000037C1000-memory.dmp

    Filesize

    4KB

  • memory/4884-28-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/4884-21-0x0000000003790000-0x0000000003791000-memory.dmp

    Filesize

    4KB

  • memory/4884-20-0x0000000003780000-0x0000000003781000-memory.dmp

    Filesize

    4KB

  • memory/4884-19-0x0000000003770000-0x0000000003771000-memory.dmp

    Filesize

    4KB

  • memory/4884-18-0x0000000003710000-0x0000000003711000-memory.dmp

    Filesize

    4KB

  • memory/4884-17-0x0000000003750000-0x0000000003751000-memory.dmp

    Filesize

    4KB

  • memory/4884-16-0x0000000003700000-0x0000000003701000-memory.dmp

    Filesize

    4KB

  • memory/4884-24-0x0000000003720000-0x000000000374C000-memory.dmp

    Filesize

    176KB

  • memory/4884-9-0x00000000036A0000-0x00000000036A1000-memory.dmp

    Filesize

    4KB

  • memory/4884-6-0x00000000016B0000-0x00000000016B1000-memory.dmp

    Filesize

    4KB

  • memory/4884-5-0x00000000016A0000-0x00000000016A1000-memory.dmp

    Filesize

    4KB

  • memory/4884-4-0x0000000001690000-0x0000000001691000-memory.dmp

    Filesize

    4KB