Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-07-2024 15:23

General

  • Target

    4240f29e3bbe4eca7720471c0b57647f_JaffaCakes118.exe

  • Size

    400KB

  • MD5

    4240f29e3bbe4eca7720471c0b57647f

  • SHA1

    a081e77e31085141ed7325aa857ed54ffca8d413

  • SHA256

    010f5e88bef9d36b43e43542e71befa91a7ae670b0b1f7c7fcbe7a3ea257f102

  • SHA512

    3cd6db288bddb05bbe249fd4374fa1b59e9373dde2f7ca99c158d1e0088debb3e92adc59fa49a99ae3d424f4a5567daed929c2476a90cf7a6376f1e603f56aeb

  • SSDEEP

    6144:qK2OaZrlH+R6nvkoCqMU0vykcs6rkF19C34YFiAUm3nDVQ5rr79pUrQYxfli:KOaZrkR6nG/d6rwWFp/DV4QEYxti

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4240f29e3bbe4eca7720471c0b57647f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4240f29e3bbe4eca7720471c0b57647f_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    PID:4332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4332-0-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4332-1-0x0000000002310000-0x0000000002311000-memory.dmp

    Filesize

    4KB

  • memory/4332-2-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4332-4-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/4332-5-0x0000000002310000-0x0000000002311000-memory.dmp

    Filesize

    4KB