Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 18:18

General

  • Target

    ebed432d5ba6cbb3ce5f0ac4e8cfbac8_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    ebed432d5ba6cbb3ce5f0ac4e8cfbac8

  • SHA1

    7c567f3ae452b74a26a49bae190ff656e1085434

  • SHA256

    fbf2e3a2332afaef32a2157a5ac56515f6d9aded412a65f9b61d414366e50fdc

  • SHA512

    1b7047f2626f27ffbe08d051c3e515e3be2db55e7858f92f8e7c465d21a65fe790e4b6118c3e643fbbc6f54d07a375b2039c59b24eb5138723fcdf4c376a0bbc

  • SSDEEP

    24576:xtJYwaTU7UoO8itce9WBZf1xCqhKuTone1hFevz1Df4TXbJEr:xtJY5U76FttSxKuU2eBDgrJEr

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 20 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebed432d5ba6cbb3ce5f0ac4e8cfbac8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebed432d5ba6cbb3ce5f0ac4e8cfbac8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4916-0-0x0000000002AC0000-0x0000000002C07000-memory.dmp

    Filesize

    1.3MB

  • memory/4916-2-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/4916-3-0x0000000000400000-0x0000000000D1E000-memory.dmp

    Filesize

    9.1MB

  • memory/4916-4-0x0000000000400000-0x0000000000D1E000-memory.dmp

    Filesize

    9.1MB

  • memory/4916-5-0x0000000000400000-0x0000000000D1E000-memory.dmp

    Filesize

    9.1MB

  • memory/4916-6-0x0000000000400000-0x0000000000D1E000-memory.dmp

    Filesize

    9.1MB

  • memory/4916-8-0x0000000000400000-0x0000000000D1E000-memory.dmp

    Filesize

    9.1MB

  • memory/4916-9-0x0000000002AC0000-0x0000000002C07000-memory.dmp

    Filesize

    1.3MB