Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 07:17

General

  • Target

    2d129ac9478cb8e01aae3f456d181be3_JaffaCakes118.exe

  • Size

    418KB

  • MD5

    2d129ac9478cb8e01aae3f456d181be3

  • SHA1

    373553b8e1dfd5f51711f0ea035e5dcc66f42106

  • SHA256

    6ca34e628f16eb5e5a33a0ebd80e64527e9c07b27b053ab655586fd89db57cb2

  • SHA512

    26059ddba0233c7d73ae440750c3c92cac33cac260b17e94f9e245af170112abc38cd6876430c65f94f712367432842cd6bb86cb495fefdf8e32340e4fd5c0f2

  • SSDEEP

    12288:FJhsOPM/9gbCI4sXsysrbM/86e3+qjEJjuijuhjDj1hrpIju2r:FJhsOPM/9gbCI4sXsysrwe3+qoJKiKhI

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d129ac9478cb8e01aae3f456d181be3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d129ac9478cb8e01aae3f456d181be3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 932
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1696-0-0x00007FF901C45000-0x00007FF901C46000-memory.dmp

    Filesize

    4KB

  • memory/1696-2-0x000000001C0A0000-0x000000001C56E000-memory.dmp

    Filesize

    4.8MB

  • memory/1696-1-0x00007FF901990000-0x00007FF902331000-memory.dmp

    Filesize

    9.6MB

  • memory/1696-3-0x000000001C570000-0x000000001C616000-memory.dmp

    Filesize

    664KB

  • memory/1696-4-0x000000001C700000-0x000000001C79C000-memory.dmp

    Filesize

    624KB

  • memory/1696-5-0x00007FF901990000-0x00007FF902331000-memory.dmp

    Filesize

    9.6MB

  • memory/1696-6-0x00000000014C0000-0x00000000014C8000-memory.dmp

    Filesize

    32KB

  • memory/1696-7-0x000000001C9B0000-0x000000001C9FC000-memory.dmp

    Filesize

    304KB

  • memory/1696-14-0x00007FF901990000-0x00007FF902331000-memory.dmp

    Filesize

    9.6MB