Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 02:21

General

  • Target

    2eab0728dd40434c1cd0f52108314f4a_JaffaCakes118.exe

  • Size

    11KB

  • MD5

    2eab0728dd40434c1cd0f52108314f4a

  • SHA1

    30753471ccb2cc69920af0a85e0b5f6ae514040f

  • SHA256

    6a812ebbf06f62cf43033f8ab3e354f0fec8ea0fb0fe6edf03d367b7a7efdf6a

  • SHA512

    6560794a3b6d26e721a7eb1fd91db52a0b344b58c434280f8a7e3185c0a3b69815a92ff84f4a80ab6b834fe818ccd3a0ecf7783e36c0f0dbcd6d4873639f513a

  • SSDEEP

    192:5mFv+D2EM3QYms48DXlaE/S+HTxiLmDvRrsT0HXVejYOBBCGZaglWCcC2H4ap:UF+D2EMfO8pHvRrB4zJAT4Y

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\2eab0728dd40434c1cd0f52108314f4a_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\2eab0728dd40434c1cd0f52108314f4a_JaffaCakes118.exe"
        2⤵
        • Adds policy Run key to start application
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2820

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads