Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-07-2024 17:10

General

  • Target

    46c0c113b85cb3e9c0562cc04edc44b1_JaffaCakes118.exe

  • Size

    251KB

  • MD5

    46c0c113b85cb3e9c0562cc04edc44b1

  • SHA1

    646f527c66e7bb0ffe9e339691240b9a6fc5fc96

  • SHA256

    925a25a0e80d25ab1d6dfcbd143885af55b004e9ae58d2a3bb8a6c952da0d02b

  • SHA512

    8725f57217480329e434f4bebdd7bafeb9ed5511824889cce2984d4f37749488b6daf5a6287199893c5dd325692c84f53c17cb7e1203f19032505c199881c4d8

  • SSDEEP

    6144:Y7n4bNYqUoPvsgMtYc7/iDaQEmtTBC+Dtx:Zb3wVbiemtTzx

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46c0c113b85cb3e9c0562cc04edc44b1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\46c0c113b85cb3e9c0562cc04edc44b1_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2540

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads