Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 00:21

General

  • Target

    13adf9829ecc5104cc530212b770a11a_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    13adf9829ecc5104cc530212b770a11a

  • SHA1

    9be636772ead0209641e74573a09941c4480a3b6

  • SHA256

    afd7677beb04637ac0890a9144fea836871a459032f3d89094b119cd36c90602

  • SHA512

    95a866fb6de68943273703889ca17f26d3f8021391c6912affef8fc6350bd46bafc949e132a0ae1c6bb22116899dc6aea5cedbcd5d2465fc6cd00ed13aa7e81a

  • SSDEEP

    1536:teRDS3W5EuVzDMv23P0M415rbrdxb8cIiVibBkTTxD:teREaBzAv2/jSIQVe+TTx

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13adf9829ecc5104cc530212b770a11a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\13adf9829ecc5104cc530212b770a11a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2052

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2052-2-0x00000000003E0000-0x00000000003F1000-memory.dmp

          Filesize

          68KB