Analysis

  • max time kernel
    140s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/04/2024, 22:47

General

  • Target

    03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.exe

  • Size

    361KB

  • MD5

    03cd2f2a69f0a2320ea27d858375e1ee

  • SHA1

    9741049b95bf467d21dbdb7168a1e34aaf75d026

  • SHA256

    f5c9649d87198e5d6161bf3dd17a5c0bac6df082e6fb8519ea3d3d1b3df01bc7

  • SHA512

    81971b7501687111350619b3be47761161cc02f6ac77161cfb083f8351a4da145f9e80eea6972950a63ff352a78bf6467b903a33dd751cacd9592b6285cfffe4

  • SSDEEP

    6144:N/vOM65ERltmlY424i31rZzd6ifcDjgftcWz808aBqpTnRQzbreoS28w:NHOrChB5/6ifusz8kqp9QzbqoSI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\03cd2f2a69f0a2320ea27d858375e1ee_JaffaCakes118.data

    Filesize

    871B

    MD5

    f78320f8345aa0dd08e41f539d0ef50c

    SHA1

    a8b5f3a8fca0ebd1e715e20f908a210b66e281ab

    SHA256

    77bd64fad57a4fa696f6c2aad9e52cf17c4d007e584668eccf3f578bd74a24a4

    SHA512

    8ca0e5d354b1e5117e05b4def2aa47daeffa40a04f337d53220358c77acf00a01dae3753e734e33b8160d5d92c84b14df8614cad1a99094f0ef60b6ddc4c5a2d

  • memory/3472-0-0x0000000000400000-0x0000000000512000-memory.dmp

    Filesize

    1.1MB

  • memory/3472-9-0x0000000000400000-0x0000000000512000-memory.dmp

    Filesize

    1.1MB