Analysis

  • max time kernel
    139s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 22:01

General

  • Target

    433d39a07c1541450d7c68c342bfb555_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    433d39a07c1541450d7c68c342bfb555

  • SHA1

    38d7f066abfde1fc0850218c38f09db75fbff7f4

  • SHA256

    229e1360e65fc78a0672073e66ffaf2a19f96f9940b5c1707bde0490697d8a37

  • SHA512

    59eb3840596269205488223a1228f3bb023cbbce274b2aab820101b38fbb9f2fa0a8b936fef863c517f0a0f672920aa0f086bb9d6717ca177501d62caeffe844

  • SSDEEP

    49152:SfwKBmF54Fm3uTeLMBW1wZvMxPcOe5HFr:Sf9+5Km3RwZEiOe5R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\433d39a07c1541450d7c68c342bfb555_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\433d39a07c1541450d7c68c342bfb555_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Windows\SysWOW64\10206137
      C:\Windows\system32\\10206137 10206137
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3292

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\10206137

          Filesize

          1.8MB

          MD5

          06cd61177479373c67080121874a59a3

          SHA1

          cab2a9904778b06d45ce0e825678afcdf51f977b

          SHA256

          cd5f288e22ca7d7dda340fc100f92bf2447c71f7e76b5f7e44022e8b52266d80

          SHA512

          7b321463ef89e1f959229fe73974d9c8667b211054813c8d01b57f4d7568b5a0aba7f47927b8959969ea63da7f223d7fe8c21e6143abceb58cd6e34662d65547