Analysis

  • max time kernel
    142s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 13:07

General

  • Target

    161d0337a809cd1589a6b3560d4974d5_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    161d0337a809cd1589a6b3560d4974d5

  • SHA1

    525ef06fe21854f891e0ac43332e71eb31c18cc3

  • SHA256

    86eaed5bfb01c116c54275f16e225af375c901ee4ff9998a9ae0e3b88ab1874e

  • SHA512

    ef0442d2e75f41b3a99a95358121a23ddd1d4b0d8a9df52145da3ee369938428929a73112e92c813c45467b3a3d6276764f5af290c148921e47090677ffe1c06

  • SSDEEP

    24576:D95afABzYKy2nSkoJj/ttg/dBoclnKklJ/RY:D95afgqhjFtg/dlnKKJ/RY

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\161d0337a809cd1589a6b3560d4974d5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\161d0337a809cd1589a6b3560d4974d5_JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of SetWindowsHookEx
    PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\RECYCLER\ã..\desktop.ini

    Filesize

    65B

    MD5

    ad0b0b4416f06af436328a3c12dc491b

    SHA1

    743c7ad130780de78ccbf75aa6f84298720ad3fa

    SHA256

    23521de51ca1db2bc7b18e41de7693542235284667bf85f6c31902547a947416

    SHA512

    884cd0cae3b31a594f387dae94fc1e0aacb4fd833f8a3368bdec7de0f9f3dc44337c7318895d9549aad579f95de71ff45e1618e75065a04c7894ad1d0d0eac56

  • memory/2872-9-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-30-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-13-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-8-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-10-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-2-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-7-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-6-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-5-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-24-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-3-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-0-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-4-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-23-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-22-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-20-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-27-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-28-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-26-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-29-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-32-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-31-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-1-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB