Analysis

  • max time kernel
    117s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 23:37

General

  • Target

    f22ed0f6132046c9e8a7545b9c7c3176_JaffaCakes118.exe

  • Size

    259KB

  • MD5

    f22ed0f6132046c9e8a7545b9c7c3176

  • SHA1

    7a50acd9e94626990ce7baf60f249e3907325d7e

  • SHA256

    04645ca682c9b7be6ba8138f728a26bbdb689781b374d22eba72bd6b758b4a74

  • SHA512

    96eded43694bf1c8bc34ead150417b02ac94455ea500937986092cbc1b745706363228d1a896f6b47ca9dc480961541b83c82fb258ad343a4d262cff5d9ba0ea

  • SSDEEP

    3072:B5z1SDuesPSNYH+EqE+Gr0KpTTWB/NykLwEIRbfbsRBRlHIKcrahlgjLPIwR7/:WufhHL+ykGbWZVmqlJwR7/

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f22ed0f6132046c9e8a7545b9c7c3176_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f22ed0f6132046c9e8a7545b9c7c3176_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    PID:436

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/436-1-0x0000000000D80000-0x0000000000D81000-memory.dmp

          Filesize

          4KB

        • memory/436-0-0x0000000000D70000-0x0000000000D71000-memory.dmp

          Filesize

          4KB

        • memory/436-2-0x0000000000DA0000-0x0000000000DA1000-memory.dmp

          Filesize

          4KB

        • memory/436-3-0x0000000000D90000-0x0000000000D91000-memory.dmp

          Filesize

          4KB

        • memory/436-4-0x0000000000DB0000-0x0000000000DD9000-memory.dmp

          Filesize

          164KB

        • memory/436-5-0x0000000001580000-0x00000000015AF000-memory.dmp

          Filesize

          188KB

        • memory/436-9-0x0000000000DB0000-0x0000000000DD9000-memory.dmp

          Filesize

          164KB

        • memory/436-12-0x0000000005680000-0x00000000056A7000-memory.dmp

          Filesize

          156KB

        • memory/436-16-0x0000000000DB0000-0x0000000000DD9000-memory.dmp

          Filesize

          164KB

        • memory/436-20-0x0000000000DB0000-0x0000000000DD9000-memory.dmp

          Filesize

          164KB