Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 15:00

General

  • Target

    63a4f1b969522645abc6a4c5ff5d0e92_JaffaCakes118.exe

  • Size

    272KB

  • MD5

    63a4f1b969522645abc6a4c5ff5d0e92

  • SHA1

    fe4d9e4aa7deb96341698ec0cb54c60374e8e82e

  • SHA256

    1e0e014f881564e4713720a72ca7affb0fee8222d3e2b90870b3bb635f1b1fdb

  • SHA512

    b9e88db7fddf4fa609ae9d070676aa8613f04fea42614d02f9621ccc5deb6d3cfb3c614b707736a907181cd0cdbac75b134cdb1bc01990966a891882cebef9f5

  • SSDEEP

    3072:lwTtj7X8LmgnUHe5zekLuEUkfLYphy17FuXh3s9CQihmkc8d8nol51i5R51BJmlI:Kl7XkUOusfkQ7FuN5rgq8o36r75

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63a4f1b969522645abc6a4c5ff5d0e92_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\63a4f1b969522645abc6a4c5ff5d0e92_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4980

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads