Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 01:13

General

  • Target

    eff43d5dc8f743b8877ac227120b993a_JaffaCakes118.exe

  • Size

    7KB

  • MD5

    eff43d5dc8f743b8877ac227120b993a

  • SHA1

    64c9bd795e143800cc20bd6fcadb5b6c45cfbe1a

  • SHA256

    2365dd9a884ea0a3475fb5796ea7770633bb3bf7142d4a3a9e2c90b7f522b76b

  • SHA512

    cb0f620af6664e7180de2bfe4a7ea93f4998b461e0750abfe3bbfbc45ebc7d0b5c7b146a44cec12171d5167c0e896a8b0330c90c996919105c642cd55f6b3358

  • SSDEEP

    192:UMUBRNeaxh0Itu3IJ8lFy/eQu2+/J+7JFx056PMLmwM1phgf+:wLNc3plFZQu220JFeXm4+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eff43d5dc8f743b8877ac227120b993a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eff43d5dc8f743b8877ac227120b993a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Deletes itself
      PID:2060

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads