Analysis

  • max time kernel
    135s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2024 20:33

General

  • Target

    8bb277d21058942f4663f2217947b944_JaffaCakes118.exe

  • Size

    2.3MB

  • MD5

    8bb277d21058942f4663f2217947b944

  • SHA1

    3f24c1fdca698f2bd23a4ba13263c5280e21501f

  • SHA256

    8fbf5e0fd35287bd3d33f56943a4d505fa818ab77cb24dd3b4dedb53dae643f5

  • SHA512

    8e355df7d448129b4ea6c5c6256ab4722ce915b0b46d7a9e363bec659bb06c4477a2064b91cf10296983899400f8093e5d257fa97dccf75568e5e8a313b204ec

  • SSDEEP

    24576:oNi8c1xMgVBGCbiDcierlUJd2oNOFcf1FFFt8eS:oNiXxMSBbkverlUJQoNkI1FFL1S

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 20 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bb277d21058942f4663f2217947b944_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8bb277d21058942f4663f2217947b944_JaffaCakes118.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4888-0-0x0000000001150000-0x0000000001226000-memory.dmp

    Filesize

    856KB

  • memory/4888-2-0x0000000001150000-0x0000000001226000-memory.dmp

    Filesize

    856KB

  • memory/4888-3-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/4888-4-0x0000000000400000-0x0000000000C96000-memory.dmp

    Filesize

    8.6MB

  • memory/4888-5-0x0000000000400000-0x0000000000C96000-memory.dmp

    Filesize

    8.6MB

  • memory/4888-6-0x0000000000400000-0x0000000000C96000-memory.dmp

    Filesize

    8.6MB

  • memory/4888-8-0x0000000001150000-0x0000000001226000-memory.dmp

    Filesize

    856KB

  • memory/4888-7-0x0000000000400000-0x0000000000C96000-memory.dmp

    Filesize

    8.6MB