Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 23:07

General

  • Target

    a2d9c40964280fcd9395a0f40b6d8e7e_JaffaCakes118.exe

  • Size

    2.3MB

  • MD5

    a2d9c40964280fcd9395a0f40b6d8e7e

  • SHA1

    78f06959131df69900b1dacd0d130b12120e93c3

  • SHA256

    3bed6d98e97f8b66634b21b2b0f4631e1bac07f7302dcbabb4cb30fc5be601c3

  • SHA512

    cfd3d047a1fa91533004473f56b4cf2006e078f3cf49b3c5ec6d129f06167fae2254c27bdaeb90e3df562b219134205bddf10f5ecdc1ea758948b8c6ebd885ed

  • SSDEEP

    24576:9pL3lYmPFPJYc+i3PbqqCBPpA6PxRRFK1Ne:9pL+mtPJh+i3D1CzkNe

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 20 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2d9c40964280fcd9395a0f40b6d8e7e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a2d9c40964280fcd9395a0f40b6d8e7e_JaffaCakes118.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4524-0-0x00000000028E0000-0x0000000002999000-memory.dmp

    Filesize

    740KB

  • memory/4524-2-0x00000000028E0000-0x0000000002999000-memory.dmp

    Filesize

    740KB

  • memory/4524-3-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/4524-4-0x0000000000400000-0x0000000000CCB000-memory.dmp

    Filesize

    8.8MB

  • memory/4524-5-0x0000000000400000-0x0000000000CCB000-memory.dmp

    Filesize

    8.8MB

  • memory/4524-6-0x0000000000400000-0x0000000000CCB000-memory.dmp

    Filesize

    8.8MB

  • memory/4524-7-0x0000000000400000-0x0000000000CCB000-memory.dmp

    Filesize

    8.8MB

  • memory/4524-9-0x00000000028E0000-0x0000000002999000-memory.dmp

    Filesize

    740KB

  • memory/4524-10-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/4524-11-0x0000000000400000-0x0000000000CCB000-memory.dmp

    Filesize

    8.8MB