Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 02:15

General

  • Target

    3752c8443c91e6dc55f83020f15ff377_JaffaCakes118.exe

  • Size

    108KB

  • MD5

    3752c8443c91e6dc55f83020f15ff377

  • SHA1

    4dea169e205a537b1ce6818b1c36839736618973

  • SHA256

    c4827529e2def5e26d6bfe6868476112aa760da579fa626b7e71cd14d6f317a1

  • SHA512

    da249737f2dbc8277eac5d02b6501c6a390ed23039b6e3a9d3a6120fc4634465469cfa0ee3172737a87fc58d63e0f3cd518e545e1764e87040c713f8213eec08

  • SSDEEP

    3072:IgXdZt9P6D3XJbC45J8SSmipbCOb62e/mLvKiYO6aT5h:Ie34445JftipbCw62Smj5YOjL

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3752c8443c91e6dc55f83020f15ff377_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3752c8443c91e6dc55f83020f15ff377_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\9GVDvgQt.dll",Install C:\Users\Admin\AppData\Local\Temp\9GVDvgQt
      2⤵
      • Loads dropped DLL
      PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9GVDvgQt.dll

    Filesize

    113KB

    MD5

    aeedbcdadb4b116a3f22bc896b968cfe

    SHA1

    f04924da22aca8b3265d73c7f2e3265700c4b3ec

    SHA256

    b813a88126502e986ac6b469e803636c2e3b1db9374ecbb4a08c902b62995d05

    SHA512

    99aab12a274616cf6fa998e7d170c758aa458c7f9a3b8f050c9ecb18c637d6650a0c7a5aa1b946ad770284b3f17c38089364e1c73855134223dd51243446c50e