Analysis
-
max time kernel
141s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 09:24
Behavioral task
behavioral1
Sample
4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe
-
Size
5.8MB
-
MD5
4db343478db4155cc0ed0b52b62276e6
-
SHA1
63cf5423ac90e7e1297f6e292ec16a8b8f44b7f9
-
SHA256
b18af07ce25512500e9f50f671ee3f6e90a14badebaf8ee68f47e1c8ff30d3de
-
SHA512
ed26d53ea02f91c62076b1eec54cb26b26c44a5eb08353c7efaf180bc556646b2eee871de9db44f1832819e818c2cfaef63bde8a6e676e2c946a0c5b066838f1
-
SSDEEP
98304:9lNNePctkzjMAYXgJ2cnBWS9dLRQUycYgGU256DI5afIUSth5N0GCJZ+kcmhNd:9lzeZjYwIcUkLdycBGD6k5afIJNjuhBp
Malware Config
Signatures
-
Loads dropped DLL 15 IoCs
pid Process 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe 3068 4db343478db4155cc0ed0b52b62276e6_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3068-0-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-69-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-70-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-71-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-72-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-73-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-74-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-75-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-76-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-77-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-78-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-79-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-80-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-81-0x0000000000400000-0x00000000005E9000-memory.dmp upx behavioral2/memory/3068-82-0x0000000000400000-0x00000000005E9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD51d7d929ed108d1f8d934f11217dc54f5
SHA1e7910d45b026e9fca4fb710aed15a49dafc67e8a
SHA256497828fc16d577822e6ff5f3b44fd2e433a7cb35dc70621e1ca8dfbf654f6f7d
SHA512d5536991536de45f233ff3494425409c8787b6c9358ab69b74ecaaf5f6eb844dbd2bb53e0875f2e56e1aa9058955b318f269bc73ec6c1b69005415657b5824cb
-
Filesize
24KB
MD54cf27e0747e5719a5478aa2624f6b996
SHA113df901e34f77e5ea11f36c0afedda7f86a2c003
SHA256e69a9d06f2c17cc021ebf9b62ca110548facdc147b67dea4846e09865043d2d9
SHA5124b0ddcbd7321128f977e1dbbe18cc76c7e489d4ee84b7775989e99778b5a60daa683c6063c5b700794b7f2070ae381fef20b19b3cb35c1babef9be79ff264941
-
Filesize
24KB
MD5124e89d0fcc409ede3595a253b788708
SHA1bc88e037c3edea02dd20aeff10818105be9f4033
SHA25627ea1b57a3024aec4a03188e80fdb2aa301fa5179c19be9c8b0dfc2aac73a114
SHA5127cd0ca268a5dbd2aa22dbce1f253a2d067ca30c5195e059c3f431d546a20d1811592f8bd8fe88b6ad9cb5c6fdd6a4666ff451b84a5e790a9d5058865d48790b1
-
Filesize
100KB
MD5606f13d4d580b1f322b3f3d3df423bba
SHA102cb375e13b415edc8b5360dffdba531e47827ed
SHA256c71a16b1056e522cd0365449448116d06f37a3273d77694d170340064511dd25
SHA512867a45dc15e99148f24fc528fbc9255582e5534bb4696700292b70163fddb15f35ddf2acd0536a9cd78b4d8f9d827bf7530d2303bfd7e428f11573b381a0986c
-
Filesize
56KB
MD5145d5c49fe34a44662beaffe641d58c7
SHA195d5e92523990b614125d66fa3fa395170a73bfe
SHA25659182f092b59a3005ada6b2f2855c7e860e53e8adf6e41cd8cd515578ae7815a
SHA51248cb0048f4fcf460e791a5b0beca40dbf2399b70f1784236b6d1f17835201d70dfa64c498814b872f57e527793c58a5959230fe40ddf5ebdcb0b1de57e9c53ef
-
Filesize
400KB
MD5027491b39a7b16b116e780f55abc288e
SHA162c0ab7c3e374d5fc9920983ee62baa4421076b4
SHA256eef69d005bf1c0b715c8d6205400d4755c261dd38ddfbbfe918e6ee91f21f1f0
SHA512fe0ba835d9af2a2c297a545bb7e30d315b580273bb1f558f16d9cba59755200a4735f75b1672e5e5fbed449eb7a5abb6d905696674c181b742bf637028953194
-
Filesize
176KB
MD51fda4c585845d719724a906a98e270e5
SHA1d1eff6bff723c2ae0aca2835c812d0ce60c32747
SHA2561f166d907f824772d370b3f2e9151d87d9d1be71bcbe7945f68ae3ca96572a23
SHA512e6894ff91d2332492e90384a8ae57e62b2e84a727c428c05317b299e6febbf3916a07fee08800db60d7e44ad21e1eec29bbf4d1bf0907f4aada410a611b546a0
-
Filesize
48KB
MD580da807e7d51376aae729f228de10ac6
SHA13b246eaffdd1c2a14bd0c427ae4b9daeaf677a6c
SHA25642089e2a8c0d996572a9dc26474494fb03197996bdf6967976b6b6f318288de3
SHA512ca768e751239ba19517779f7b936d086ac1564c12652ea53e7d01a860d031fde7e5c3019cba301757c984c1119fcfa5bf6bb9f75aa76c667c95f38389e1a3f7e