Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 08:34

General

  • Target

    62865239c12038a421e1063b9fd94e75_JaffaCakes118.exe

  • Size

    46KB

  • MD5

    62865239c12038a421e1063b9fd94e75

  • SHA1

    2d98e8e6b1a43f15645d186b7b685ae8c1f7f133

  • SHA256

    f61f41383da43a261aff4a0a36723c0d28661bdcb3a39d243f9f2e0b1d377da3

  • SHA512

    4f892ed3449f89bcf25d8d08013c72202d1f4cd63897ab640da415381546ed44808372eec0ee06f62412ab6af9643da410e3fd53ed53d0f9d296bb2e21e6bbb8

  • SSDEEP

    768:tJ0TuEB+XXI9rI8XxulvLwfJa/FKutaD2JgT+tYuT8te9m8BKEcgxjwZf7iG5oO9:t7EB+HIVJXxMLGuKaYuT/LKVfuG5oOc2

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62865239c12038a421e1063b9fd94e75_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\62865239c12038a421e1063b9fd94e75_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/588-2-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/588-7-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB