Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 00:12

General

  • Target

    df24c697109428ff1a32056d71aa56cf_JaffaCakes118.exe

  • Size

    369KB

  • MD5

    df24c697109428ff1a32056d71aa56cf

  • SHA1

    58f84518da35c783d44d367d400abc6ae6a5828b

  • SHA256

    98a16f0f2a9413e37012a7b52db2b67f8daa2aea286027aae9c7921f39f4652f

  • SHA512

    fd60894833eb35df5a49635210f1f0f1fd8b576a4ada32cf9a903b71ea0515fab1d9a732717abf49f9fd61aaa92d8074ad965fa2c4265c507110bb7dd97b1dd7

  • SSDEEP

    6144:EIHc8H11veNnhaYaBpJ3VhJ8gOfqVUI5OxWuKFGRb8YhMvCMa9bUFyUC7xzsnJ8:EqdHvKnyphBVUOy

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\df24c697109428ff1a32056d71aa56cf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\df24c697109428ff1a32056d71aa56cf_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    PID:4192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4192-0-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

    Filesize

    4KB

  • memory/4192-1-0x0000000001200000-0x0000000001202000-memory.dmp

    Filesize

    8KB

  • memory/4192-2-0x0000000001770000-0x0000000001771000-memory.dmp

    Filesize

    4KB

  • memory/4192-3-0x0000000001850000-0x0000000001851000-memory.dmp

    Filesize

    4KB

  • memory/4192-5-0x0000000001880000-0x0000000001881000-memory.dmp

    Filesize

    4KB

  • memory/4192-4-0x0000000001870000-0x0000000001871000-memory.dmp

    Filesize

    4KB

  • memory/4192-16-0x0000000003DF0000-0x0000000003DF1000-memory.dmp

    Filesize

    4KB

  • memory/4192-13-0x0000000003D90000-0x0000000003D91000-memory.dmp

    Filesize

    4KB

  • memory/4192-12-0x0000000003D80000-0x0000000003D81000-memory.dmp

    Filesize

    4KB

  • memory/4192-11-0x0000000003D70000-0x0000000003D71000-memory.dmp

    Filesize

    4KB

  • memory/4192-10-0x0000000003D60000-0x0000000003D61000-memory.dmp

    Filesize

    4KB

  • memory/4192-9-0x0000000003D50000-0x0000000003D51000-memory.dmp

    Filesize

    4KB

  • memory/4192-7-0x0000000003900000-0x0000000003901000-memory.dmp

    Filesize

    4KB

  • memory/4192-17-0x0000000003D30000-0x0000000003D32000-memory.dmp

    Filesize

    8KB

  • memory/4192-18-0x0000000003DC0000-0x0000000003DEC000-memory.dmp

    Filesize

    176KB

  • memory/4192-15-0x0000000003DB0000-0x0000000003DB1000-memory.dmp

    Filesize

    4KB

  • memory/4192-31-0x0000000003E90000-0x0000000003E91000-memory.dmp

    Filesize

    4KB

  • memory/4192-30-0x0000000003E80000-0x0000000003E81000-memory.dmp

    Filesize

    4KB

  • memory/4192-29-0x0000000003E70000-0x0000000003E71000-memory.dmp

    Filesize

    4KB

  • memory/4192-28-0x0000000003E20000-0x0000000003E21000-memory.dmp

    Filesize

    4KB

  • memory/4192-27-0x0000000003E60000-0x0000000003E61000-memory.dmp

    Filesize

    4KB

  • memory/4192-26-0x0000000003E50000-0x0000000003E51000-memory.dmp

    Filesize

    4KB

  • memory/4192-25-0x0000000003E40000-0x0000000003E41000-memory.dmp

    Filesize

    4KB

  • memory/4192-24-0x0000000003E30000-0x0000000003E31000-memory.dmp

    Filesize

    4KB

  • memory/4192-23-0x0000000003E00000-0x0000000003E01000-memory.dmp

    Filesize

    4KB

  • memory/4192-22-0x0000000003E10000-0x0000000003E11000-memory.dmp

    Filesize

    4KB

  • memory/4192-14-0x0000000003DA0000-0x0000000003DA1000-memory.dmp

    Filesize

    4KB

  • memory/4192-8-0x0000000003D40000-0x0000000003D41000-memory.dmp

    Filesize

    4KB

  • memory/4192-6-0x0000000001890000-0x0000000001891000-memory.dmp

    Filesize

    4KB

  • memory/4192-38-0x0000000003EB0000-0x0000000003EB1000-memory.dmp

    Filesize

    4KB