Analysis

  • max time kernel
    133s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 01:40

General

  • Target

    934e7a7298a0a541cd3e67ccf9e5fafa_JaffaCakes118.exe

  • Size

    257KB

  • MD5

    934e7a7298a0a541cd3e67ccf9e5fafa

  • SHA1

    1c9355e8ee319dbaeb2582dde2a42a1f6c01f44c

  • SHA256

    163bc66647056a5fbc738ec6c8a7005ce2eabba63c12bbac462869a4616e8c6e

  • SHA512

    12ba4eedc236919edf978fab18936efc1f806c976d773cfd98a8da9b2c2e90c50a85fbac61aa8c3590ee19cce01673a034f964f33e597b0163db76f3d8ac046b

  • SSDEEP

    6144:GHTymns3VuNKm8usZjQxNC6WJ1wWbt78t7:0sUb8/jQxNC6C5t78t7

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\934e7a7298a0a541cd3e67ccf9e5fafa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\934e7a7298a0a541cd3e67ccf9e5fafa_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    PID:4180

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4180-0-0x00000000016E0000-0x00000000016E1000-memory.dmp

    Filesize

    4KB

  • memory/4180-2-0x0000000001700000-0x0000000001701000-memory.dmp

    Filesize

    4KB

  • memory/4180-3-0x0000000001710000-0x0000000001711000-memory.dmp

    Filesize

    4KB

  • memory/4180-4-0x0000000001750000-0x0000000001779000-memory.dmp

    Filesize

    164KB

  • memory/4180-1-0x00000000016F0000-0x00000000016F1000-memory.dmp

    Filesize

    4KB

  • memory/4180-5-0x0000000002550000-0x000000000257F000-memory.dmp

    Filesize

    188KB

  • memory/4180-9-0x0000000001750000-0x0000000001779000-memory.dmp

    Filesize

    164KB

  • memory/4180-14-0x00000000025D0000-0x00000000025F7000-memory.dmp

    Filesize

    156KB

  • memory/4180-18-0x0000000001750000-0x0000000001779000-memory.dmp

    Filesize

    164KB

  • memory/4180-22-0x0000000001750000-0x0000000001779000-memory.dmp

    Filesize

    164KB