Analysis

  • max time kernel
    93s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 13:55

General

  • Target

    49f8a759588d799b5d385a11cb0ca939_JaffaCakes118.exe

  • Size

    40KB

  • MD5

    49f8a759588d799b5d385a11cb0ca939

  • SHA1

    da7ba1f7e67f4226a96ada0bf6369a596e0212d0

  • SHA256

    c1cc6f6f414b5b4ebae44bdb97ee80f2034dc6f59f1f35a839b187f61e15ee7d

  • SHA512

    d7cacd03b0e0a579c42d1e1205c204083217122da7c286653ab19d7cc0a3004dcf4403456c77181b0580ffdadd02fa54cc7626989ae8527b4a1d41eb7e399bc0

  • SSDEEP

    384:IGg7Ro3/bsVnuti/shfcfMMVr1zk6M7GDvhu7bnvkPEeVI7d9EY3aSkLQJWf:Mhpki/u6hg6G7bsP5I73EgRJWf

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49f8a759588d799b5d385a11cb0ca939_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\49f8a759588d799b5d385a11cb0ca939_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\o83p4\tmp.exe

    Filesize

    88KB

    MD5

    ffb1e6e077a3380d38bd6b4cbd997b1e

    SHA1

    f2dea7d30ed79f3a21e4f582e942e131398be745

    SHA256

    0da2851c605baf6d2adc8e914d2288234664a0cf3713a8f8ea46a25a16736da5

    SHA512

    ef4a96ec715c51780f3dc5ab8e0dab3c462f44be441d3d8fa3f6d64d206cd612959326613b903802f1c988c4586b9fd93e01058e03af66bbbeaaa14884cc5f55