Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
f7814e4025fb8db300e7831e13f8b763_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7814e4025fb8db300e7831e13f8b763_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f7814e4025fb8db300e7831e13f8b763_JaffaCakes118.exe
-
Size
342KB
-
MD5
f7814e4025fb8db300e7831e13f8b763
-
SHA1
e20097c4eed7bad6f98e68b45ec42201dfe56680
-
SHA256
6f48961d3f9bb91db16beabd886557e5b9ae45a4212c3b1b2737ad06bed47eb2
-
SHA512
0d60e40b8e35e4ec7059263751a8e7bafe4c54caf1e9bb7621e95e23ca2fe5f64508b3d212b926d67df58e589f3e28affa446b35721d8c215e470b992435e4d8
-
SSDEEP
6144:PVZBzUsR4NLf3UlpIbtKvLF0Swl8V4kvpsdrVXD4kO7NKlCjoDuK1WmGf+Bbqbh:tZB2NrUTIbE508V4kGr3O7N8CUDvGWBE
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3932 5020 WerFault.exe 84 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5020 f7814e4025fb8db300e7831e13f8b763_JaffaCakes118.exe 5020 f7814e4025fb8db300e7831e13f8b763_JaffaCakes118.exe 5020 f7814e4025fb8db300e7831e13f8b763_JaffaCakes118.exe 5020 f7814e4025fb8db300e7831e13f8b763_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7814e4025fb8db300e7831e13f8b763_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7814e4025fb8db300e7831e13f8b763_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:5020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 25602⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5020 -ip 50201⤵PID:4856
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5208214311b66e9b31a58889474bbc382
SHA1fc752d05b8d51434f0d72f78c268aa3a1294d8a9
SHA2563c6329eff836eb8ca7c749742adea429a9fe1460229700d92f5a5d7ad7a019d9
SHA5121ed1dd5be56d7e20eb6381c6c7370001e67ad93f5699ffc16a9a51b42d9912d5f20bd4aaf13136c9af42efd45e4596919a5073b1033cf39ca71656dbafb42023
-
Filesize
6KB
MD50fabae0b2454559d8f1a5a885eca310f
SHA12e690c03d34af2fdb2e45d788b9c712fc0e58bcd
SHA2568fb5e5cc346dca1e73b1444e948eade6610c02f8f4edc70f3da84c332b305ad4
SHA512be8189261d599acfb6c4d8fcb2f5a87b680fe5d43bbc741d4bc2912862f52c16d8dc7c7b6703a56b28a741d832e4e8a8383f8b7bca832180751eb7e70fe22322
-
Filesize
10KB
MD5cd083f1eb22b8ff5ab1f09e635fe25b0
SHA143ded4f849efa210866ee83e086a9ab99ffd4850
SHA25652c50d61f939ce840332d25d556fdaf178b8690647ee3eaa7727d701a2866a04
SHA51290c5bfebf46257d653d908915c082b4559c9eefc9c9696041429e8f32e00947d9ce142177358aec2eed4297e902edbb17aa24bc8851c2d8f3abcbf3b01ce39fc
-
Filesize
315B
MD5d25fe5d17b2a5faf18531af2d58151b3
SHA1c9a1004248f544dadb2b1430fa1debf226c8b7bb
SHA25616899f3d229c9de1b8de845ee4a79ea1cc49428908891c9d8628fdc01cb9fd51
SHA5125dd7c92d489f9a2e70e91700e2859f27113381d9b24c3a19547b4bcdfeff5de9098fe85369148ea8cfe219fbb8386f0200f27f69f791e3261092a08c2304f3bb
-
Filesize
5KB
MD5d6fd086dee91ccec740eb0c8b4281f82
SHA193eddf243f19a0c339f84390521f878aafb81a35
SHA2562ac0a99a6884825de7d14a9387efe0ff8cb615a944d2ef057a0f2e3aa619ce85
SHA5124044f8d8673c2fa66111f509cfb914687d6009c5da6adad236388d3812538accd22eaee49f2b70aa144e36d4f286464bd0f2f9e1c224396b978f95b9bbe11d69
-
Filesize
128KB
MD5856da12c0a02ad10d5da971ceb2d02f5
SHA1c8cb94a32972d34aa4f37ec8648fddf2911443c2
SHA2568d021520b86238207a5f27ad8a4860d1e9f82bacd0b4f60425d53cbf83e4dae2
SHA5128b36df8191e6729e9d8e2b32d04d5ea557caee449b77511a8e6f24c865faea21cfc55b3b78698ad55088cfa544ff84dd9e98e0914b73934ba35e095d64cab8c7