Analysis

  • max time kernel
    139s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 17:21

General

  • Target

    09d368aef2e73573a342522d02a6b69d_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    09d368aef2e73573a342522d02a6b69d

  • SHA1

    a0f79ed0759b97c47028e28a08b1d0205bd6a018

  • SHA256

    e8c37775148975cfeaabf41d3806b7be1bb66286ec4f5a5861469df37ea09404

  • SHA512

    e7babe7509d50b04f013598c95aacab70bfd9c4afa9e74fbadeac0336a1f4729e0b359b61c124c7728b628780f1740ec428ac5dc627df8246b2688439a09a15a

  • SSDEEP

    24576:TlwHpsVXpruoJdXN0BN2qnw4a+edxoBrLdggNxzfadB3Ic:SH2VZruoJdXN0BMOwLloBrugnydB3Ic

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09d368aef2e73573a342522d02a6b69d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\09d368aef2e73573a342522d02a6b69d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3316
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 748
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:4356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3316-0-0x00007FFC397D5000-0x00007FFC397D6000-memory.dmp

    Filesize

    4KB

  • memory/3316-1-0x000000001BB80000-0x000000001BB96000-memory.dmp

    Filesize

    88KB

  • memory/3316-2-0x00007FFC39520000-0x00007FFC39EC1000-memory.dmp

    Filesize

    9.6MB

  • memory/3316-3-0x00007FFC39520000-0x00007FFC39EC1000-memory.dmp

    Filesize

    9.6MB

  • memory/3316-10-0x00007FFC39520000-0x00007FFC39EC1000-memory.dmp

    Filesize

    9.6MB