Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 00:03

General

  • Target

    0ab8a3887614702beb0dc293ec9dbfd6_JaffaCakes118.exe

  • Size

    454KB

  • MD5

    0ab8a3887614702beb0dc293ec9dbfd6

  • SHA1

    fa4d614794d3bb5a04b2a427f3769144b0c59629

  • SHA256

    b4ec5816de8023bb9f7f2f1e134573bca9a7aaf9d1107fec11342a5a58ca7425

  • SHA512

    622a2f6b8bec6a612206e9bbc420ca944f95622918e2e905738ed9731240a21af6d9e1e9726ae46999c86e7c898a0778e26f0be28d9449d5ffa3bc2390ec540c

  • SSDEEP

    6144:qFq8HjsP7XfoCY0WzJ7kICiWbTbSeS9mzkSsxcQLIyxpJXuDFkiMChaAftx1xrGe:qY8HIlWSICiWb/S7mgiEIyDJXuR9UXa9

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ab8a3887614702beb0dc293ec9dbfd6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0ab8a3887614702beb0dc293ec9dbfd6_JaffaCakes118.exe"
    1⤵
      PID:1636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1636-0-0x0000000000020000-0x0000000000022000-memory.dmp

      Filesize

      8KB

    • memory/1636-1-0x0000000000030000-0x0000000000031000-memory.dmp

      Filesize

      4KB

    • memory/1636-2-0x0000000000150000-0x0000000000151000-memory.dmp

      Filesize

      4KB

    • memory/1636-10-0x0000000000600000-0x0000000000601000-memory.dmp

      Filesize

      4KB

    • memory/1636-12-0x0000000000630000-0x0000000000631000-memory.dmp

      Filesize

      4KB

    • memory/1636-11-0x0000000000620000-0x0000000000621000-memory.dmp

      Filesize

      4KB

    • memory/1636-9-0x00000000005F0000-0x00000000005F1000-memory.dmp

      Filesize

      4KB

    • memory/1636-8-0x00000000005E0000-0x00000000005E1000-memory.dmp

      Filesize

      4KB

    • memory/1636-7-0x00000000005D0000-0x00000000005D1000-memory.dmp

      Filesize

      4KB

    • memory/1636-6-0x0000000000570000-0x0000000000571000-memory.dmp

      Filesize

      4KB

    • memory/1636-5-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB

    • memory/1636-4-0x0000000000170000-0x0000000000171000-memory.dmp

      Filesize

      4KB

    • memory/1636-3-0x0000000000160000-0x0000000000161000-memory.dmp

      Filesize

      4KB

    • memory/1636-13-0x00000000005C0000-0x00000000005C2000-memory.dmp

      Filesize

      8KB

    • memory/1636-18-0x0000000000640000-0x0000000000641000-memory.dmp

      Filesize

      4KB

    • memory/1636-17-0x00000000005B0000-0x00000000005B1000-memory.dmp

      Filesize

      4KB

    • memory/1636-16-0x00000000005A0000-0x00000000005A1000-memory.dmp

      Filesize

      4KB

    • memory/1636-15-0x0000000000590000-0x0000000000591000-memory.dmp

      Filesize

      4KB

    • memory/1636-14-0x0000000000580000-0x0000000000581000-memory.dmp

      Filesize

      4KB

    • memory/1636-19-0x0000000000650000-0x0000000000651000-memory.dmp

      Filesize

      4KB

    • memory/1636-20-0x0000000000660000-0x0000000000661000-memory.dmp

      Filesize

      4KB

    • memory/1636-21-0x0000000000670000-0x0000000000671000-memory.dmp

      Filesize

      4KB