Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/04/2024, 14:10

General

  • Target

    07d88a7a056c0349cefa3dac43c1279a_JaffaCakes118.exe

  • Size

    226KB

  • MD5

    07d88a7a056c0349cefa3dac43c1279a

  • SHA1

    6577393dd69b44e0845c0fc0d1eea1a2e650e488

  • SHA256

    12e1c8383d461e533a1c6e6a7a81b6c8fe0ffe81334dbb8e4b30f05be55e3c0e

  • SHA512

    43bc53a36e012e97401d2f3c670734639de1f841f217855ee78a03fcaf339072a4997881672f22245b4730d9d751d3e5d3af37bb78649046035997993d724972

  • SSDEEP

    3072:+EypO7zwybX40oQG0kR5Ij+XojynXKRf0zHiJpc7TCrLpGfDaNV:+Eyps32ji+Yj/Rf0bidLpGfDaj

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07d88a7a056c0349cefa3dac43c1279a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07d88a7a056c0349cefa3dac43c1279a_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    PID:4136

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4136-2-0x0000000001470000-0x0000000001471000-memory.dmp

          Filesize

          4KB

        • memory/4136-1-0x0000000001450000-0x0000000001451000-memory.dmp

          Filesize

          4KB

        • memory/4136-0-0x0000000001270000-0x0000000001271000-memory.dmp

          Filesize

          4KB

        • memory/4136-4-0x0000000001CA0000-0x0000000001CA1000-memory.dmp

          Filesize

          4KB

        • memory/4136-3-0x0000000001480000-0x0000000001481000-memory.dmp

          Filesize

          4KB

        • memory/4136-5-0x0000000001CB0000-0x0000000001CD0000-memory.dmp

          Filesize

          128KB

        • memory/4136-10-0x0000000001CB0000-0x0000000001CD0000-memory.dmp

          Filesize

          128KB

        • memory/4136-6-0x0000000004930000-0x000000000495F000-memory.dmp

          Filesize

          188KB

        • memory/4136-18-0x0000000001CB0000-0x0000000001CD0000-memory.dmp

          Filesize

          128KB