Analysis

  • max time kernel
    132s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 02:37

General

  • Target

    ec80869161e7a2733ab4b16b1d6ccd36_JaffaCakes118.exe

  • Size

    147KB

  • MD5

    ec80869161e7a2733ab4b16b1d6ccd36

  • SHA1

    694a7c6ece735003f64694d3752b477de04eb21f

  • SHA256

    15fb5600be1e548c2c8c739ec9a97da92e2d118109aeb1342f89b91b02f3b9a4

  • SHA512

    e5105e0dd562f98a381de13e670348009dbdaf84a89de2159022b7c791ccece98ad3892308e0e50dd0d196efd858e3395fc9f746962628c550d4bae6381cdc58

  • SSDEEP

    3072:3FluBg9qIcnyTzusE8p5LNqKHzDIwljQ4eyKumoNf0/76:1w4qIcn4zLxqKHgwx/koJ0/W

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec80869161e7a2733ab4b16b1d6ccd36_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec80869161e7a2733ab4b16b1d6ccd36_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\ec80869161e7a2733ab4b16b1d6ccd36_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ec80869161e7a2733ab4b16b1d6ccd36_JaffaCakes118.exe
      2⤵
        PID:1396

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1396-2-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1396-4-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1396-5-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB