Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 02:13

General

  • Target

    dd7692d0a8a618a78463b56cce12df1e_JaffaCakes118.exe

  • Size

    437KB

  • MD5

    dd7692d0a8a618a78463b56cce12df1e

  • SHA1

    489fe9e5613a93db1d437a4c6f0e58a12bcc4af9

  • SHA256

    c2615f534a1d58715a968b94d64b1fe1279228c9c297e95f7b10db305d51145d

  • SHA512

    23d99fa3534283c3b9aaff81eeeb9793eb0dde69bc1f9855e70d057c69daa46cbaaa7ecbb3e183a8df9b44c1db3185fb448df8b4fccbd06252b872af2f010b41

  • SSDEEP

    1536:s6hqmbQ8NNunP1zdjLWQLV0AaTCnNUjyIFdWMBAVFbSKEBEBqwlh+qplOJVkxx:x1vjutlLWIXxnH+ypSXBKBlJp2kx

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd7692d0a8a618a78463b56cce12df1e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dd7692d0a8a618a78463b56cce12df1e_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\RMCFPWWEE.exe

    Filesize

    437KB

    MD5

    dd7692d0a8a618a78463b56cce12df1e

    SHA1

    489fe9e5613a93db1d437a4c6f0e58a12bcc4af9

    SHA256

    c2615f534a1d58715a968b94d64b1fe1279228c9c297e95f7b10db305d51145d

    SHA512

    23d99fa3534283c3b9aaff81eeeb9793eb0dde69bc1f9855e70d057c69daa46cbaaa7ecbb3e183a8df9b44c1db3185fb448df8b4fccbd06252b872af2f010b41

  • memory/4080-12-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB