Analysis

  • max time kernel
    140s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 03:41

General

  • Target

    65e241e8d6e9ec4fd4f19cf7e299c72f_JaffaCakes118.exe

  • Size

    64KB

  • MD5

    65e241e8d6e9ec4fd4f19cf7e299c72f

  • SHA1

    bbf1ce8d379045efbba67974a0c8a7fb4cff1da6

  • SHA256

    bb08289230d6cc288fbc30e8bdde67bebdb656628ee118fa8d38baf9eb2d5086

  • SHA512

    ad7e59da7c19421a6c6b16891669bee06799f7bd3052f409cc6f4049211e1280df26f34dee3e8a0768461703493a0fda428fa86fe5cd2ed657a15da4502688ee

  • SSDEEP

    384:l9FTR2wm+PDoGW7Wc/wWv+IJ23aLaddg3MxXts0uNxH9z33LVXURzD7jF:pTR2wv7oGWB/dv+pHXtINxH533mRnP

Score
10/10

Malware Config

Extracted

Family

guloader

C2

https://onedrive.live.com/download?cid=618391B69828CF46&resid=618391B69828CF46%21116&authkey=AFIe13OF4pl0MRQ

xor.base64

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65e241e8d6e9ec4fd4f19cf7e299c72f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65e241e8d6e9ec4fd4f19cf7e299c72f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1984-2-0x00000000020B0000-0x00000000020BE000-memory.dmp

    Filesize

    56KB