Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 19:05

General

  • Target

    0f2f5b26d1a4ae958ce59f0b7bde6435_JaffaCakes118.exe

  • Size

    6.3MB

  • MD5

    0f2f5b26d1a4ae958ce59f0b7bde6435

  • SHA1

    bc5a9bd3b88fc2bf2121205c97608fbac6ebe78d

  • SHA256

    c849ffb813985190c8a02bf55ee7154fb6ba3cd0a61b9637e2fc5d59bc8de80c

  • SHA512

    d77a7c4f5eb3004b814f28e8eae84f38b68b83050b9dc9a0d6291da162dbce12c2185d55c2d7ffd40e5cb4f83cf3a222b0686bb9b6b284bec3d5857c5ff4e02d

  • SSDEEP

    98304:9qyxGNACutJE4LnWadDonJB7fW5GQ0YHowTS+4R9NargR+tx/lG9EI7vIta2iuJ:UyxHCugYWadDo7WkGHow0nQxwT7A0cJ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f2f5b26d1a4ae958ce59f0b7bde6435_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0f2f5b26d1a4ae958ce59f0b7bde6435_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3864
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 1056
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:3488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3864-0-0x00000000749C2000-0x00000000749C3000-memory.dmp

    Filesize

    4KB

  • memory/3864-1-0x00000000749C0000-0x0000000074F71000-memory.dmp

    Filesize

    5.7MB

  • memory/3864-2-0x00000000749C0000-0x0000000074F71000-memory.dmp

    Filesize

    5.7MB

  • memory/3864-11-0x00000000749C0000-0x0000000074F71000-memory.dmp

    Filesize

    5.7MB