Analysis

  • max time kernel
    93s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 23:03

General

  • Target

    ce1d7325f09205dbb89c8c61309ae31e_JaffaCakes118.exe

  • Size

    454KB

  • MD5

    ce1d7325f09205dbb89c8c61309ae31e

  • SHA1

    5225221dc68c3e551b4eb86cc51a9da9f6271da6

  • SHA256

    01331e97a2773cc768192a431a0084837088b156bcd17f850185a11e6953eedd

  • SHA512

    7f3338caec39939414168ff820b33cf6dbb9c5983a460f0e6de9a8de968429385f3978133b15df27f48620b456d6720d0d1cd04d294dd24a67b4f034e168516e

  • SSDEEP

    6144:k91McrMFGhNzA/VzKZV+fNgHWaxO4aCIKOTpmxsBxJ4yDHExD5sMH300ozMKVT+V:k99rMkhNizKZ2IWaxO4aFPAxFyknjF

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce1d7325f09205dbb89c8c61309ae31e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ce1d7325f09205dbb89c8c61309ae31e_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    PID:376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/376-0-0x00000000001A0000-0x00000000001A2000-memory.dmp

    Filesize

    8KB

  • memory/376-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/376-2-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/376-4-0x00000000004A0000-0x00000000004A1000-memory.dmp

    Filesize

    4KB

  • memory/376-3-0x0000000000490000-0x0000000000491000-memory.dmp

    Filesize

    4KB

  • memory/376-8-0x0000000000530000-0x0000000000531000-memory.dmp

    Filesize

    4KB

  • memory/376-7-0x0000000000520000-0x0000000000521000-memory.dmp

    Filesize

    4KB

  • memory/376-6-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/376-14-0x00000000005A0000-0x00000000005A1000-memory.dmp

    Filesize

    4KB

  • memory/376-17-0x0000000000A50000-0x0000000000A51000-memory.dmp

    Filesize

    4KB

  • memory/376-16-0x0000000000510000-0x0000000000512000-memory.dmp

    Filesize

    8KB

  • memory/376-18-0x00000000005B0000-0x00000000005D6000-memory.dmp

    Filesize

    152KB

  • memory/376-23-0x0000000000A80000-0x0000000000A81000-memory.dmp

    Filesize

    4KB

  • memory/376-22-0x0000000000A70000-0x0000000000A71000-memory.dmp

    Filesize

    4KB

  • memory/376-13-0x0000000000580000-0x0000000000581000-memory.dmp

    Filesize

    4KB

  • memory/376-12-0x0000000000570000-0x0000000000571000-memory.dmp

    Filesize

    4KB

  • memory/376-15-0x0000000000A40000-0x0000000000A41000-memory.dmp

    Filesize

    4KB

  • memory/376-11-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/376-10-0x0000000000550000-0x0000000000551000-memory.dmp

    Filesize

    4KB

  • memory/376-9-0x0000000000540000-0x0000000000541000-memory.dmp

    Filesize

    4KB

  • memory/376-5-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/376-25-0x00000000004D0000-0x00000000004D1000-memory.dmp

    Filesize

    4KB

  • memory/376-24-0x0000000000A60000-0x0000000000A61000-memory.dmp

    Filesize

    4KB

  • memory/376-26-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB

  • memory/376-28-0x0000000000500000-0x0000000000501000-memory.dmp

    Filesize

    4KB

  • memory/376-27-0x00000000004F0000-0x00000000004F1000-memory.dmp

    Filesize

    4KB

  • memory/376-29-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

    Filesize

    4KB

  • memory/376-30-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

    Filesize

    4KB

  • memory/376-34-0x0000000001540000-0x0000000001541000-memory.dmp

    Filesize

    4KB