Analysis

  • max time kernel
    141s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 14:32

General

  • Target

    7246eb28d10cde33d245d92b97bf4b44_JaffaCakes118.exe

  • Size

    4.1MB

  • MD5

    7246eb28d10cde33d245d92b97bf4b44

  • SHA1

    0502592cb4e4705abc15fe002e246446bf27e4c0

  • SHA256

    e2657ae1286c0c0bb6afe20b3c2be00b5ad143da7b121336d2be8344e27686b3

  • SHA512

    edb2e8fdb053f23b167e0fee5c1e2f0f0e59bf0f04bbb834e9404e785b74bff2e391903bd4b741ac19b04a64e2eed745990ab67e4f0db8c8d23d6a2084d1323a

  • SSDEEP

    98304:jzRsJadCk68VWkzdJg1E2rmNX3R3aVviJYayOxN:3O4dCq532rmNX3oBKYK

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7246eb28d10cde33d245d92b97bf4b44_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7246eb28d10cde33d245d92b97bf4b44_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4336
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1680,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:8
    1⤵
      PID:1492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4336-0-0x00000000025F0000-0x00000000025F1000-memory.dmp

      Filesize

      4KB

    • memory/4336-2-0x0000000000400000-0x0000000000829000-memory.dmp

      Filesize

      4.2MB

    • memory/4336-3-0x0000000000400000-0x0000000000829000-memory.dmp

      Filesize

      4.2MB

    • memory/4336-4-0x00000000025F0000-0x00000000025F1000-memory.dmp

      Filesize

      4KB