Analysis

  • max time kernel
    91s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 22:08

General

  • Target

    2666bc8e9efab5f06797b3c9ba7e9498_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    2666bc8e9efab5f06797b3c9ba7e9498

  • SHA1

    5c6809b5e80739c012dc357439c2a50ae04e9662

  • SHA256

    5e79e5a1aa4c0f3448dbfc20d05c71d9d67556e7adee86940284bf9f317edb3d

  • SHA512

    3fab9865c4c43c516822add47fa2a1a2600165b60bc2d738b3fe438f846844b75b518eb8f9e1f0739474aeea575e1e0e7f1cac42dcf2b75d1eb002300c25bad1

  • SSDEEP

    1536:j2ria5FUjZSktWoqhDv6Zm4vAt9feIjlxtwZ9uUzPT+M4UfQ225QYrBvuOTX:arlLUjZDKv6HO92IjXtO9uUT6UQDHBvt

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2666bc8e9efab5f06797b3c9ba7e9498_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2666bc8e9efab5f06797b3c9ba7e9498_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n3r5rgve\tmp.exe

    Filesize

    116KB

    MD5

    91fd4af53ef5174e58b692dc15138a1c

    SHA1

    f81882ccf9ece12593107921cfbc57245b1e2ef7

    SHA256

    7196675c74cd50ec2d4210b3c681b09ff0baac7547a880b525c05a0a2816f132

    SHA512

    4aa983b3f9195e34ec7733d09b9d143c5f9f0cb9aee55ea77f9a81d7fbab98cde60605483a3fc62d4aee5b6c17bb7fd69d237884d07d4d61642883a0dce6df9b