Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-07-2024 19:30

General

  • Target

    1f5ea06e1c469341653dbec2e519e573_JaffaCakes118.exe

  • Size

    16KB

  • MD5

    1f5ea06e1c469341653dbec2e519e573

  • SHA1

    37284c7805b0044e2c8f7a1ebf486f53c1c8721e

  • SHA256

    6e583adac8898dc310ba84f6feb3c1c3582ca89b36297cf797959b7763964a10

  • SHA512

    ce2b81f253499f95f2b430713978e76393219472d80806cb4ef6df6d3d2ecccd03bfcbe851e2c16fbaa8a02d6ad7cc10804f3cea36cbf1dbf0b7c32df8697d7a

  • SSDEEP

    384:52/mDvD2lVzGOGUn9muhNculb5s1AwiNym5Ct:52/mDvD2lVt3wuhNfSso

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f5ea06e1c469341653dbec2e519e573_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1f5ea06e1c469341653dbec2e519e573_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/940-0-0x00007FF913005000-0x00007FF913006000-memory.dmp

    Filesize

    4KB

  • memory/940-2-0x000000001C240000-0x000000001C70E000-memory.dmp

    Filesize

    4.8MB

  • memory/940-1-0x00007FF912D50000-0x00007FF9136F1000-memory.dmp

    Filesize

    9.6MB

  • memory/940-3-0x000000001BC30000-0x000000001BCD6000-memory.dmp

    Filesize

    664KB

  • memory/940-4-0x000000001C780000-0x000000001C7E2000-memory.dmp

    Filesize

    392KB

  • memory/940-5-0x00007FF912D50000-0x00007FF9136F1000-memory.dmp

    Filesize

    9.6MB

  • memory/940-6-0x00007FF912D50000-0x00007FF9136F1000-memory.dmp

    Filesize

    9.6MB

  • memory/940-7-0x00007FF913005000-0x00007FF913006000-memory.dmp

    Filesize

    4KB

  • memory/940-8-0x00007FF912D50000-0x00007FF9136F1000-memory.dmp

    Filesize

    9.6MB