Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 19:37

General

  • Target

    f42f5885b6004a001430dcdb89b19397_JaffaCakes118.exe

  • Size

    18KB

  • MD5

    f42f5885b6004a001430dcdb89b19397

  • SHA1

    aa5ded2a03ec430d08ed8fd7074279265d2cdf39

  • SHA256

    a0c2d66fe0c0c551fe1b12bd27ea9b495c37bc9744bcc696a7e9ba7633c93805

  • SHA512

    5b44cab23848a06c128cb5d04385867d5dee4960c8bebd76275682f55af5d60d57b0f7cffeea4d02923e698c9b6275faec8636b60dfb35e07051b8cc08ee1175

  • SSDEEP

    384:gtmL+/ikPwqyhYNjYxWd8Kf3O82koiglZipCtp:gtmNhqnYxW+KPO82bI

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\f42f5885b6004a001430dcdb89b19397_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f42f5885b6004a001430dcdb89b19397_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1820

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\~!#4770.tmp

            Filesize

            3B

            MD5

            ad4102106375d09dd138adfcf3b6c882

            SHA1

            474c638758ba37e1900f19bb32de897b016f47b4

            SHA256

            a90ea0a5d549c3ea3fcd7459ccc812aabf5bf5dfe7604eff9131328afe26eeba

            SHA512

            889584c0c9c509c69c33107d62e59e165838aaf3c03e5f384e7f9ecc3ee398e14e5483e2bb186bd85703a8bd6e5d2f4e50693d50418ff3667977d6d271ce9738

          • memory/1248-1-0x0000000002A20000-0x0000000002A22000-memory.dmp

            Filesize

            8KB

          • memory/1820-0-0x00000000003B0000-0x00000000003B2000-memory.dmp

            Filesize

            8KB

          • memory/1820-116-0x00000000003B0000-0x00000000003B2000-memory.dmp

            Filesize

            8KB