Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 19:05

General

  • Target

    294a82a36e1a4a4d23cd83323b260119_JaffaCakes118.exe

  • Size

    140KB

  • MD5

    294a82a36e1a4a4d23cd83323b260119

  • SHA1

    130f83f104bf2616110b428aeaf11bbd2aeb99fd

  • SHA256

    1751cc332157e031dd2e8dd95c97989c6428d9b4639ee7784776aca38097f533

  • SHA512

    45c424810227c75dfdd36e13a1f818e9c4bc7db3f8d6a8c4a31e3345343896ee3088e88f8d4863e10f90476fa42556f550cb151cb1847ecbbd2f83762c54a592

  • SSDEEP

    3072:PvkHeR+EFgG3tXhjPMp+adhpHjgeNkSlKwXPhrJqt:PcHeR+Yg8pMFh5fkSDPXqt

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\294a82a36e1a4a4d23cd83323b260119_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\294a82a36e1a4a4d23cd83323b260119_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\v20oq\tmp.exe

    Filesize

    40KB

    MD5

    39a252dd40c7792cc6713a8a6bfa76b6

    SHA1

    10d31f4eddf32dc587c43f3a6d77f37c7451a30b

    SHA256

    37bcfac9f255ac9fbb4634f8c04d4d6b42fc44f9497b83f245f90705d58541c2

    SHA512

    4f1dde717fc68828ab62806bd86412b44cf88c650f4328b7f704ed1641d7f5d2a2e130c4d185bd63f2c64b67ec682b9190ec3f79cc0156bd086a59a4e612a8cf