Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2024 00:52

General

  • Target

    32ac901809c321e818003b9b28e62b26_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    32ac901809c321e818003b9b28e62b26

  • SHA1

    5a78c499d750e07ef8c0c79e17e86ba6541f267e

  • SHA256

    52736acbb7ae1068f101dc19e78910c7b0cac6c5c70578538ad7a0f92c7df510

  • SHA512

    82ca8ca42c4a3ed812313c16adc76c024a621f0566eb245b3b943d43f8dc308f1479239432ad8263a24710b93b0082a995259ac6ce77b8ca00b3439674e6b499

  • SSDEEP

    1536:olbWdu8SHNzCsuXlxFnToIfK2olOhLHrR:s6s8SVCsuXlxtTBfK2omLH1

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\32ac901809c321e818003b9b28e62b26_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\32ac901809c321e818003b9b28e62b26_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Checks processor information in registry
    PID:4920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads