Analysis

  • max time kernel
    136s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 02:04

General

  • Target

    6963119871efa7f893d7422eb8c9e525_JaffaCakes118.exe

  • Size

    369KB

  • MD5

    6963119871efa7f893d7422eb8c9e525

  • SHA1

    0e164fcc36e4111dea155bc2add93c9d8fd14d15

  • SHA256

    4eaceccfda476bec836761e6f0454d1fd1365b7f439ade7c91e10892da2c9350

  • SHA512

    6d3775563bec02ef7f582d0f5a9ae14154e91e074b71e6be4cc12dc543cddc1f6fe3bfea76bb8690e19e6bd925a4754fb20666bc8a4b19851c8d21e7fe29f9b5

  • SSDEEP

    6144:tO7EmU0q7KPNFDxQBd3GU/cz0JgK5RboXjpFhPSrDtF5oGSrHVl++a+a1x79+fVF:47E4q+lFWQ1ggK5dolPgY72aB

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\6963119871efa7f893d7422eb8c9e525_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6963119871efa7f893d7422eb8c9e525_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    PID:400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/400-0-0x0000000000C30000-0x0000000000C31000-memory.dmp

    Filesize

    4KB

  • memory/400-1-0x0000000000C40000-0x0000000000C42000-memory.dmp

    Filesize

    8KB

  • memory/400-2-0x0000000000C50000-0x0000000000C51000-memory.dmp

    Filesize

    4KB

  • memory/400-3-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

    Filesize

    4KB

  • memory/400-13-0x0000000003340000-0x0000000003341000-memory.dmp

    Filesize

    4KB

  • memory/400-17-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/400-16-0x0000000003360000-0x0000000003361000-memory.dmp

    Filesize

    4KB

  • memory/400-15-0x0000000000E50000-0x0000000000E52000-memory.dmp

    Filesize

    8KB

  • memory/400-14-0x0000000003350000-0x0000000003351000-memory.dmp

    Filesize

    4KB

  • memory/400-12-0x0000000003330000-0x0000000003331000-memory.dmp

    Filesize

    4KB

  • memory/400-11-0x0000000003320000-0x0000000003321000-memory.dmp

    Filesize

    4KB

  • memory/400-10-0x0000000003310000-0x0000000003311000-memory.dmp

    Filesize

    4KB

  • memory/400-9-0x0000000000E70000-0x0000000000E71000-memory.dmp

    Filesize

    4KB

  • memory/400-8-0x0000000000E60000-0x0000000000E61000-memory.dmp

    Filesize

    4KB

  • memory/400-7-0x0000000000E40000-0x0000000000E41000-memory.dmp

    Filesize

    4KB

  • memory/400-6-0x0000000000E30000-0x0000000000E31000-memory.dmp

    Filesize

    4KB

  • memory/400-5-0x0000000000E20000-0x0000000000E21000-memory.dmp

    Filesize

    4KB

  • memory/400-4-0x0000000000E10000-0x0000000000E11000-memory.dmp

    Filesize

    4KB

  • memory/400-24-0x0000000003380000-0x00000000033AC000-memory.dmp

    Filesize

    176KB

  • memory/400-20-0x00000000033E0000-0x00000000033E1000-memory.dmp

    Filesize

    4KB

  • memory/400-23-0x0000000003410000-0x0000000003411000-memory.dmp

    Filesize

    4KB

  • memory/400-29-0x0000000003430000-0x0000000003431000-memory.dmp

    Filesize

    4KB

  • memory/400-28-0x00000000033D0000-0x00000000033D1000-memory.dmp

    Filesize

    4KB

  • memory/400-22-0x0000000003400000-0x0000000003401000-memory.dmp

    Filesize

    4KB

  • memory/400-21-0x00000000033F0000-0x00000000033F1000-memory.dmp

    Filesize

    4KB

  • memory/400-19-0x0000000003370000-0x0000000003371000-memory.dmp

    Filesize

    4KB

  • memory/400-18-0x00000000033C0000-0x00000000033C1000-memory.dmp

    Filesize

    4KB

  • memory/400-34-0x0000000002F10000-0x0000000002F11000-memory.dmp

    Filesize

    4KB

  • memory/400-33-0x0000000003420000-0x0000000003421000-memory.dmp

    Filesize

    4KB

  • memory/400-38-0x0000000004900000-0x0000000004901000-memory.dmp

    Filesize

    4KB