Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 20:19

General

  • Target

    1c5cb11278456ffa17804231411cf970_JaffaCakes118.exe

  • Size

    206KB

  • MD5

    1c5cb11278456ffa17804231411cf970

  • SHA1

    8e1b5cc4c2c44ad94cc20967082cd6452044086a

  • SHA256

    4e8af0552df70d8b7ef7322bbd2e4d1a353cb0e2388fe96c01cbb73b7202bff9

  • SHA512

    941bb2b426afefd3256bfcb8b0f1f8aa1b6f09056b0653ff58085cc9a90527767c32fe124edc16af5ab055976624177a9e712b75670722a676910ebca52297e9

  • SSDEEP

    3072:kpsDrUP6rBkMfIXezdJH7e7TCPFI01l0TY+GoYSdLILYVa:kpoAClfIOPbemP95+99eLYc

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c5cb11278456ffa17804231411cf970_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1c5cb11278456ffa17804231411cf970_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    PID:4616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4616-0-0x00000000005C0000-0x00000000005EE000-memory.dmp

    Filesize

    184KB

  • memory/4616-1-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4616-2-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB