Analysis

  • max time kernel
    141s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2024, 00:56

General

  • Target

    0d09e131cb0bfa9df62d32f25420c04e_JaffaCakes118.exe

  • Size

    182KB

  • MD5

    0d09e131cb0bfa9df62d32f25420c04e

  • SHA1

    02224aabc27fd7293313aaeb4970f4da58ed59ec

  • SHA256

    6b7246f7914fc833f9f619ede4509ac4f30e8d44a628b3c91e21e92e675f8662

  • SHA512

    de5910728c8b9085166ad00f86c28adc3262c65afdc8fab67fb36a98a27cc08ad07d61c76062895b622eb47469ca403a318f06f2313bf6b087d4366c37b9c7b3

  • SSDEEP

    3072:mvstUKlvJ2+usOKDUcJaCcBBoKxiAga+4WvNc+xiz8TnYvclg6JFa9EGyLQEXmsT:m0tU7bsJ6RBoL4T18bPlLJFbLQI1LiL4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d09e131cb0bfa9df62d32f25420c04e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0d09e131cb0bfa9df62d32f25420c04e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4376

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\dfs3A59.tmp

          Filesize

          251KB

          MD5

          a1bebaea757db992d76e8a5a85e4aabd

          SHA1

          2ceeeb96fcd6a71d3d0ea2c1d67b891a3abd4ffb

          SHA256

          80e8d587f59e07b0b5936677c76bb194f048429321f5a57382198015b9f127ae

          SHA512

          3b6727584b222031b8948a1c1ca480ed20d378d95ffdc351eac4e936516af4304200e162d2a3eec8e2ddb236829e08a2a3269655076530044d6294ae84fd16bb

        • memory/4376-11-0x00000000055D0000-0x00000000055DA000-memory.dmp

          Filesize

          40KB

        • memory/4376-13-0x0000000074DD0000-0x0000000075580000-memory.dmp

          Filesize

          7.7MB

        • memory/4376-7-0x00000000051C0000-0x0000000005204000-memory.dmp

          Filesize

          272KB

        • memory/4376-1-0x0000000000F30000-0x0000000000F33000-memory.dmp

          Filesize

          12KB

        • memory/4376-8-0x0000000005A50000-0x0000000005FF4000-memory.dmp

          Filesize

          5.6MB

        • memory/4376-9-0x00000000053F0000-0x0000000005482000-memory.dmp

          Filesize

          584KB

        • memory/4376-3-0x0000000074DDE000-0x0000000074DDF000-memory.dmp

          Filesize

          4KB

        • memory/4376-10-0x0000000074DD0000-0x0000000075580000-memory.dmp

          Filesize

          7.7MB

        • memory/4376-12-0x0000000074DD0000-0x0000000075580000-memory.dmp

          Filesize

          7.7MB

        • memory/4376-0-0x0000000000810000-0x0000000000884000-memory.dmp

          Filesize

          464KB

        • memory/4376-14-0x0000000008850000-0x00000000088B6000-memory.dmp

          Filesize

          408KB

        • memory/4376-15-0x0000000074DD0000-0x0000000075580000-memory.dmp

          Filesize

          7.7MB

        • memory/4376-24-0x0000000000810000-0x0000000000884000-memory.dmp

          Filesize

          464KB

        • memory/4376-25-0x0000000000F30000-0x0000000000F33000-memory.dmp

          Filesize

          12KB

        • memory/4376-26-0x0000000074DDE000-0x0000000074DDF000-memory.dmp

          Filesize

          4KB

        • memory/4376-27-0x0000000074DD0000-0x0000000075580000-memory.dmp

          Filesize

          7.7MB