Analysis

  • max time kernel
    172s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 14:29

General

  • Target

    f5fc3fc23782e21abf6580129ece9152_JaffaCakes118.exe

  • Size

    160KB

  • MD5

    f5fc3fc23782e21abf6580129ece9152

  • SHA1

    2d938483b2c43d7b6976eaae3105c5257b2ae3a2

  • SHA256

    51fe5b3908e09aa2ad6eee40338b06912c86ee71977e1f65d5052636e1c948f6

  • SHA512

    8662abf3aaa51653311580955d0c604dc4f3ca6ee7343666432a69edb77ec04441542884c645fe43898e22e7364a66510537ede66265fe7758ad6c84d623ef88

  • SSDEEP

    3072:+APkscHVX2VbIKikyC8v2ogRvaBC2oA5EVvVquQtrt6C8LoXW3I:vksc1XPvBFCY0vV5QtR6jB4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5fc3fc23782e21abf6580129ece9152_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5fc3fc23782e21abf6580129ece9152_JaffaCakes118.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\C2F1.tmp

    Filesize

    580B

    MD5

    eb40dde1103e12dc23faa7d348241f8f

    SHA1

    439b280a9bfa1a6d04016b22a1720327f838cc7c

    SHA256

    d08985fbffcf18a6ccb471cd9855f183d1495ac87343d79477d12337500bc411

    SHA512

    e51c04782a029301490ed21a7faedd532f159d71570953083cec10a2098c5da9596a19c4c40845d454c25b300dfe8894249063fa2fed497a6f56c545b6abee77

  • memory/2680-0-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2680-13-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2680-14-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2680-34-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2680-35-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2680-38-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2680-45-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2680-46-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB