Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 12:38

General

  • Target

    a5937d6f63d9cad7e63811c03dbe0b36_JaffaCakes118.exe

  • Size

    865KB

  • MD5

    a5937d6f63d9cad7e63811c03dbe0b36

  • SHA1

    d782e8be0bd5a8e5867ea4a541b18bdef45e82d2

  • SHA256

    d533d038a5436f65cc3cea29e0e72e2ff27c6a3b27e979115b8236efec19a96d

  • SHA512

    86f26d569e024b2b051e9716fe6d6e587957b0a4cfee99815316d2a8ae38a2cc00ad58006559186df6996630a53f85ce4098b3967029b6705b5c5eac21c8389c

  • SSDEEP

    12288:LwrJxfWP3FyKHLHw9ItZ5UIIp/nqM5R1iF1zUdgr4iH3TOpQkXEOFKq:8rJxf3KAQ5tIVnqM5Q1zU+dOmkXrFKq

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5937d6f63d9cad7e63811c03dbe0b36_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a5937d6f63d9cad7e63811c03dbe0b36_JaffaCakes118.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4896

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4896-11-0x0000000002C70000-0x0000000002DF4000-memory.dmp

          Filesize

          1.5MB

        • memory/4896-10-0x0000000002C70000-0x0000000002DF4000-memory.dmp

          Filesize

          1.5MB

        • memory/4896-9-0x0000000002C70000-0x0000000002DF4000-memory.dmp

          Filesize

          1.5MB

        • memory/4896-2-0x0000000002C70000-0x0000000002DF4000-memory.dmp

          Filesize

          1.5MB

        • memory/4896-12-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

          Filesize

          4KB

        • memory/4896-14-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

          Filesize

          4KB