Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 09:57

General

  • Target

    d6156f2d39900fff93df85d91655a131_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    d6156f2d39900fff93df85d91655a131

  • SHA1

    02a0166daebbd6c4b701b0b6ef4a1ff1166e2c13

  • SHA256

    9e24ee612c05e172e743c2487d72a56445b41078f45314e35685987fedaa030f

  • SHA512

    9abfecb7a69d3b0dc9f885be6c8856646f73d268c3bff3a5854dfca8d47af6e7ac47c5be6717902265f1e5b75b8eaaea0c3fcaeca86b53bd576bb374afefe50f

  • SSDEEP

    768:K1cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJZuiPOCmthUIOccNd/eDOSKi+envY8:IQpQ5EP0ijnRTXJki6zOD61/uKzA8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6156f2d39900fff93df85d91655a131_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d6156f2d39900fff93df85d91655a131_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3192

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsdC045.tmp\inetc.dll

          Filesize

          20KB

          MD5

          50fdadda3e993688401f6f1108fabdb4

          SHA1

          04a9ae55d0fb726be49809582cea41d75bf22a9a

          SHA256

          6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

          SHA512

          e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8