Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 04:49

General

  • Target

    14bbe82730035551ad455adead99bb94_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    14bbe82730035551ad455adead99bb94

  • SHA1

    be9b5ae619f538d289f5b2aae82994600a599060

  • SHA256

    c170f20120226a1548c6d45e48099790cab53b40edd392d206defc1fe8628a24

  • SHA512

    f15bca31b885d80d3d15ae1d79356f1aea28b357cb689f02674d6e00375b7456d3cfcacd18867189d791bde5b938f7e962a3ec19b21df958d06be72e69b22236

  • SSDEEP

    1536:oluWdu8SHNzCsuXlCFnToIfK2oROhLHrR:s3s8SVCsuXlCtTBfK2oaLH1

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\14bbe82730035551ad455adead99bb94_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\14bbe82730035551ad455adead99bb94_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Checks processor information in registry
    PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads