Analysis

  • max time kernel
    93s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 11:14

General

  • Target

    8de1cb89469d1f3601355f044ca4e8f3_JaffaCakes118.exe

  • Size

    3.2MB

  • MD5

    8de1cb89469d1f3601355f044ca4e8f3

  • SHA1

    5bdb991a2e82f7077ea13534d4d2e576a41f7b65

  • SHA256

    261961cd1c492678180ddb809ff3b2fe97310fc406a30ca2d2c360ec2775d789

  • SHA512

    aa324ba36e16c1acb7a4161115897fb548c47a30ccab2bcfe6d07546b6c1459f9cac98e098a6c4a8d403564d4846876332e23d552bdf5fba3527806df6af99a7

  • SSDEEP

    24576:ipn6rkqMnGodidc70hDI1hCya+XYj6FU2dQn3k:iQrMngdK06zCV6FRcU

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 20 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8de1cb89469d1f3601355f044ca4e8f3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8de1cb89469d1f3601355f044ca4e8f3_JaffaCakes118.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1680-0-0x0000000002AA0000-0x0000000002B04000-memory.dmp

    Filesize

    400KB

  • memory/1680-3-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/1680-2-0x0000000002AA0000-0x0000000002B04000-memory.dmp

    Filesize

    400KB

  • memory/1680-4-0x0000000000400000-0x0000000000E40000-memory.dmp

    Filesize

    10.2MB

  • memory/1680-5-0x0000000000400000-0x0000000000E40000-memory.dmp

    Filesize

    10.2MB

  • memory/1680-6-0x0000000000400000-0x0000000000E40000-memory.dmp

    Filesize

    10.2MB

  • memory/1680-8-0x0000000002AA0000-0x0000000002B04000-memory.dmp

    Filesize

    400KB

  • memory/1680-7-0x0000000000400000-0x0000000000E40000-memory.dmp

    Filesize

    10.2MB