Analysis

  • max time kernel
    95s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 09:58

General

  • Target

    494c67b9552b5d8d4f852bdde6321a72_JaffaCakes118.exe

  • Size

    21KB

  • MD5

    494c67b9552b5d8d4f852bdde6321a72

  • SHA1

    046f2f4779ab1acd3421e86dec543a7d6acf9acf

  • SHA256

    79d7ffa76b36b92fe2844715ef163cc0e4eebe98361d0f2646b85299985c2c52

  • SHA512

    2416acc8dfc7c8225c90bbd04d09fcff2f052f08cbe4679a71a863bee44c6687b50c54633175c4a2fc76f71044290408133c0f6a7523ca724290f6fd2e2aff57

  • SSDEEP

    192:dyRQc9XLt63Yl9avM8vnfGMABoM7rAdAO2qnSmqHA4OuGG+MT8ItN:dy99KYl9adnfGMAWMQWOA1h8+

Score
7/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 2 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\494c67b9552b5d8d4f852bdde6321a72_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\494c67b9552b5d8d4f852bdde6321a72_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Print Processors
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    PID:3556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3556-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3556-1-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3556-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB