Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 09:10

General

  • Target

    28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe

  • Size

    688KB

  • MD5

    28013955485b7d0b5619d67bf40c84a1

  • SHA1

    24cd8c8b59b1a4a4891c3ed7945aba51857ebd12

  • SHA256

    dfcea601ab96eac59a2f8c4a574b9ee394026e8436ca6fa3dde4b4b6b14342e2

  • SHA512

    3e657e76a5710d91a005cde9549a6cdc39882071a88e5ad0cc2a61e40c8587e8df0a0117699b92e2306e074651e1eb9d5bd7a7e90804134d7a064a2ee5946bb5

  • SSDEEP

    12288:i2Utxo37CEzLnQ9Uo5helNx/H8YrWyLB8u1q0sRt0yDQFpK3:i2UofQuoDeF/HX6r0sRt0SQFO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Users\Admin\AppData\Local\Temp\is-NL44R.tmp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-NL44R.tmp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.tmp" /SL5="$502B6,431198,210944,C:\Users\Admin\AppData\Local\Temp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-KE4K3.tmp\isxdl.dll

    Filesize

    58KB

    MD5

    792620390aae5305220283f2ce33ca68

    SHA1

    d9fee4cb3e2fa5e7d88b45662fd58b30aa9979f0

    SHA256

    21bc620515ebbdeb125d273c2d8db45577d05408ef624464af26afcfecfd201a

    SHA512

    470914116f40e4f7216c840ccbc706eb7953c10e62195c9b4d15e73f422625096df6c68edb33c25e2eec3305b4a1b159054f812c4a2307aeb3e49d35ae5f575c

  • C:\Users\Admin\AppData\Local\Temp\is-NL44R.tmp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.tmp

    Filesize

    822KB

    MD5

    46619ec3f1389e31d0465c732e4b6d30

    SHA1

    c047898596c97ab529be6d6a9c95384caf6e108d

    SHA256

    80681a4183ee10748ba2fa2be0a91d317d0b7f0653d6ab14e5135c181dbbf9d6

    SHA512

    a74aee02d67e8fd30a8230fe14e58aff385564a5bb07b0c22396b2fdd7cea904275eb7b0d3e516f2dacaf3bdd7d6dc268be82f5253144dff07ae125b79ff2a1e

  • memory/4272-12-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/4272-18-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/4424-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4424-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/4424-17-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB