Analysis

  • max time kernel
    149s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 12:03

General

  • Target

    0dff8d06630745d30d091d7363a2c500_JaffaCakes118.exe

  • Size

    896KB

  • MD5

    0dff8d06630745d30d091d7363a2c500

  • SHA1

    e10092296f697a2d9e7ac5cae87e9bee43508da8

  • SHA256

    210cf3ba9e52edfaf1248c8fd44d5959ab017ecb22c05d3d6b1dbf61d993b7e2

  • SHA512

    f3befef9a07ee5405f14d4adc30a5e8b704123e7f5d0a686292a361a922974a394f95b677c1dd063372883c93ca94724ffbc8b20f6443ce9fbbe1ab164d9b4fd

  • SSDEEP

    12288:YESoNJs4ys8+k+aiptW5v9edN1gFAbdYLRlOmGH9fjAX/k+:YCs4yD5+qI+LR4JH9fj6

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 5 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dff8d06630745d30d091d7363a2c500_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0dff8d06630745d30d091d7363a2c500_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Drops file in Windows directory
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of AdjustPrivilegeToken
    PID:432

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/432-0-0x0000000000400000-0x0000000000569000-memory.dmp

          Filesize

          1.4MB

        • memory/432-2-0x0000000002150000-0x00000000021E4000-memory.dmp

          Filesize

          592KB

        • memory/432-7-0x0000000002150000-0x00000000021E4000-memory.dmp

          Filesize

          592KB

        • memory/432-10-0x0000000000400000-0x0000000000569000-memory.dmp

          Filesize

          1.4MB

        • memory/432-11-0x0000000000400000-0x0000000000569000-memory.dmp

          Filesize

          1.4MB

        • memory/432-14-0x0000000002150000-0x00000000021E4000-memory.dmp

          Filesize

          592KB

        • memory/432-13-0x0000000000400000-0x0000000000569000-memory.dmp

          Filesize

          1.4MB

        • memory/432-12-0x0000000000400000-0x0000000000569000-memory.dmp

          Filesize

          1.4MB

        • memory/432-16-0x0000000000910000-0x0000000000911000-memory.dmp

          Filesize

          4KB

        • memory/432-17-0x0000000002150000-0x00000000021E4000-memory.dmp

          Filesize

          592KB

        • memory/432-19-0x0000000000400000-0x0000000000569000-memory.dmp

          Filesize

          1.4MB

        • memory/432-21-0x0000000002150000-0x00000000021E4000-memory.dmp

          Filesize

          592KB