Analysis

  • max time kernel
    125s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 20:16

General

  • Target

    f08845667dcc358707e2aa1c20b9cb88_JaffaCakes118.exe

  • Size

    252KB

  • MD5

    f08845667dcc358707e2aa1c20b9cb88

  • SHA1

    db3d38920084394d36997604a98986989faa8ac0

  • SHA256

    b0d29e464eb2b82476dc83254dbf16a3ad33ed0e6b6153794433c63c0be9b971

  • SHA512

    70efd59a9c2f725094693263de4515fe49790457ac5dc5c70fda05f1e0bb103f990502f14f59515467a4821ff5da176f0b056e93e3ebd5cc6d43673b580c19e5

  • SSDEEP

    3072:fwjWkWjmmLUhfTSoIl/6iRhJLh/PgGNXOQYNuwQ6aBsiGMfZWuDi8nzZT8t:YS32a/6ahxh/Azu/GMR7i+9s

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f08845667dcc358707e2aa1c20b9cb88_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f08845667dcc358707e2aa1c20b9cb88_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2032
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4260,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=4008 /prefetch:8
    1⤵
      PID:4996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2032-0-0x00007FFAAC155000-0x00007FFAAC156000-memory.dmp

      Filesize

      4KB

    • memory/2032-1-0x00007FFAABEA0000-0x00007FFAAC841000-memory.dmp

      Filesize

      9.6MB

    • memory/2032-2-0x000000001B6C0000-0x000000001BB8E000-memory.dmp

      Filesize

      4.8MB

    • memory/2032-3-0x000000001BB90000-0x000000001BC36000-memory.dmp

      Filesize

      664KB

    • memory/2032-4-0x000000001BCF0000-0x000000001BD8C000-memory.dmp

      Filesize

      624KB

    • memory/2032-5-0x00007FFAABEA0000-0x00007FFAAC841000-memory.dmp

      Filesize

      9.6MB

    • memory/2032-6-0x000000001B080000-0x000000001B088000-memory.dmp

      Filesize

      32KB

    • memory/2032-7-0x000000001BE50000-0x000000001BE9C000-memory.dmp

      Filesize

      304KB

    • memory/2032-8-0x000000001B0B0000-0x000000001B0B6000-memory.dmp

      Filesize

      24KB

    • memory/2032-11-0x00007FFAABEA0000-0x00007FFAAC841000-memory.dmp

      Filesize

      9.6MB

    • memory/2032-12-0x00007FFAABEA0000-0x00007FFAAC841000-memory.dmp

      Filesize

      9.6MB

    • memory/2032-13-0x00007FFAAC155000-0x00007FFAAC156000-memory.dmp

      Filesize

      4KB

    • memory/2032-14-0x00007FFAABEA0000-0x00007FFAAC841000-memory.dmp

      Filesize

      9.6MB