Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2024, 07:21

General

  • Target

    4d500517676b12e48615e886b1241fb1_JaffaCakes118.exe

  • Size

    159KB

  • MD5

    4d500517676b12e48615e886b1241fb1

  • SHA1

    55bf3d261a9ad015212d61c06aa30dfba9903156

  • SHA256

    c5d161943588300c4677255d50aeacd9d6552d2d5d4f7a4202630f04abc7090b

  • SHA512

    120e76154aa9c22603e47d004e5bfeebe63dc1de35094b703659b6b849e43e5ddf0dea2c9b6c1d3c4b5eb57621a29d67122a325f51fb6788f449184393d91285

  • SSDEEP

    3072:ez2CY1htTsv1vhxkuHMfZ81A1/emx5yb3pv3gpvuEcK3krZUz5L+B:4Y1htTs9vjMfZ81eQ3lg9ulKcZUzM

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 23 IoCs
  • Drops file in Windows directory 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d500517676b12e48615e886b1241fb1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4d500517676b12e48615e886b1241fb1_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4324

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\MicrosoftPresentation.exe

          Filesize

          159KB

          MD5

          4d500517676b12e48615e886b1241fb1

          SHA1

          55bf3d261a9ad015212d61c06aa30dfba9903156

          SHA256

          c5d161943588300c4677255d50aeacd9d6552d2d5d4f7a4202630f04abc7090b

          SHA512

          120e76154aa9c22603e47d004e5bfeebe63dc1de35094b703659b6b849e43e5ddf0dea2c9b6c1d3c4b5eb57621a29d67122a325f51fb6788f449184393d91285

        • memory/4324-3-0x0000000000448000-0x000000000044C000-memory.dmp

          Filesize

          16KB

        • memory/4324-4-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/4324-74-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB