Analysis

  • max time kernel
    132s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 16:23

General

  • Target

    cff48d4e8803379e4bb231d0c32ae821_JaffaCakes118.exe

  • Size

    221KB

  • MD5

    cff48d4e8803379e4bb231d0c32ae821

  • SHA1

    1e12bf843f66013b5569d5ff3dcf6874ee5e0eaa

  • SHA256

    370fa48ffd1d472a159d34299e96a949110070ce85a0c18379632fd0b69a9b74

  • SHA512

    c7046c56999fdb562165ac467cd81425b47785b7711769381c88552a45944195eea4997bdc337e16e5b18adc03fd743f1bd0e8ec19d21df13e8ee4b76d6d6d15

  • SSDEEP

    6144:4gLw1dILPAX8ln6aB4WP3E29V8S4Dhg0fn2J6Z2SLqF/6B11EFiUvCMSAjcPA:Jw1dILPAX8ln6aB4WP3E29V8S4Dhg0fi

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cff48d4e8803379e4bb231d0c32ae821_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cff48d4e8803379e4bb231d0c32ae821_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2956
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4076,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=1044 /prefetch:8
    1⤵
      PID:2840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2956-0-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/2956-2-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB