Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2024 21:07

General

  • Target

    366242f9116fa66bbad784daaa6d0653_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    366242f9116fa66bbad784daaa6d0653

  • SHA1

    9aebfe36ff5b313fe7a2d73ab7f049a423bb0d71

  • SHA256

    e732636fb25b111f94cf990810706138ae6302a3c66e4e46dbb813f40d6fe803

  • SHA512

    6b1b4c77bddaabf3f85f376cdf3ff12ee496e8e5f735bb947d71a94c1ddf6c4b065f828fcd18916f40053c1a7f70bd9305af77ff87654b808569e1ac7b2d3d4e

  • SSDEEP

    24576:/cBmYktcs++5FGcILtuLBshbDtgQKXdZXE6EhllNGK7Vf77GBPBAIDA0w:/3hVFYLtUshbDtgQKPh0xGmVj7GB5Av

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\366242f9116fa66bbad784daaa6d0653_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\366242f9116fa66bbad784daaa6d0653_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4168-1-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/4168-0-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/4168-2-0x0000000000A24000-0x0000000000AD9000-memory.dmp

    Filesize

    724KB

  • memory/4168-6-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/4168-7-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/4168-5-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/4168-4-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/4168-8-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/4168-9-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/4168-10-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB

  • memory/4168-11-0x0000000000400000-0x0000000000AD9000-memory.dmp

    Filesize

    6.8MB