Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 02:06

General

  • Target

    ec72f0b1053d50af2fbc7febccfafc75_JaffaCakes118.exe

  • Size

    200KB

  • MD5

    ec72f0b1053d50af2fbc7febccfafc75

  • SHA1

    264ed170272b1851a9efec241a514c6143b7b8e5

  • SHA256

    e01e913e4958e68f17ea96875b54f53fdbdd3beac059cae002b7c7e02eaf098a

  • SHA512

    567b9a3179f8f3aa3ada2d87b5e6554cde61c637786ceb09b998fa35c5b106696c2fbc2794de9b5290252686a591562a893a16fc22e7b4eae9820c28783362ff

  • SSDEEP

    3072:P6X2lMM6ERTUDAKWQyIf6/1Bg61Z28nd+/bt68r4AqvNF61+f/FWbH9c:P6mRZtNjI21i61Znd+Dt6e4jvz61+Vyc

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec72f0b1053d50af2fbc7febccfafc75_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec72f0b1053d50af2fbc7febccfafc75_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Users\Admin\AppData\Local\Temp\ec72f0b1053d50af2fbc7febccfafc75_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ec72f0b1053d50af2fbc7febccfafc75_JaffaCakes118.exe"
      2⤵
        PID:4548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 12
          3⤵
          • Program crash
          PID:3932
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4548 -ip 4548
      1⤵
        PID:1312

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4548-7-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/4680-9-0x0000000076F13000-0x0000000076F14000-memory.dmp

              Filesize

              4KB

            • memory/4680-8-0x0000000075150000-0x0000000075240000-memory.dmp

              Filesize

              960KB

            • memory/4680-3-0x0000000000D70000-0x0000000000DA9000-memory.dmp

              Filesize

              228KB

            • memory/4680-5-0x0000000076F12000-0x0000000076F13000-memory.dmp

              Filesize

              4KB

            • memory/4680-6-0x0000000002630000-0x0000000002640000-memory.dmp

              Filesize

              64KB

            • memory/4680-2-0x0000000001000000-0x000000000102C000-memory.dmp

              Filesize

              176KB

            • memory/4680-0-0x0000000001000000-0x000000000102C000-memory.dmp

              Filesize

              176KB

            • memory/4680-4-0x0000000000D50000-0x0000000000D60000-memory.dmp

              Filesize

              64KB

            • memory/4680-10-0x0000000076F03000-0x0000000076F04000-memory.dmp

              Filesize

              4KB

            • memory/4680-11-0x0000000001000000-0x000000000102C000-memory.dmp

              Filesize

              176KB

            • memory/4680-12-0x0000000000FD0000-0x0000000000FE0000-memory.dmp

              Filesize

              64KB

            • memory/4680-13-0x0000000075150000-0x0000000075240000-memory.dmp

              Filesize

              960KB

            • memory/4680-14-0x0000000000D70000-0x0000000000DA9000-memory.dmp

              Filesize

              228KB

            • memory/4680-1-0x0000000000D30000-0x0000000000D34000-memory.dmp

              Filesize

              16KB