Analysis

  • max time kernel
    141s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 07:02

General

  • Target

    27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe

  • Size

    432KB

  • MD5

    27a6f94d0f00f7f590b4598d81aae3a4

  • SHA1

    6cbc9ecfa4632a5fddff7fa2d9fd6e07f894954b

  • SHA256

    221ecd2487198c29b649fe52d9b4750726ca313618fb54fb54d47a34b4ee3564

  • SHA512

    a88b3f44c7fe1147d68815580252b092ca9d9f45ad69f0122217cafdb631552097f1c80490fb3583b22c28e5bc8ec4138fa05693c09b81593a90bffc56eba2ae

  • SSDEEP

    1536:Suy1OHiO3R1NyCRSzBw2NqVnGLo9TLfFEhC50G9JsP96+T+kmmOON5jU1YYCsMDn:SuyCR2QVGLo9ffFEOsDpjnB9be6

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2508-2-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2508-4-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2508-17-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB