Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 02:22

General

  • Target

    7090a408680e2b8523f45a8ac12b3e15_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    7090a408680e2b8523f45a8ac12b3e15

  • SHA1

    357843c08309bb89f48e848555d544d9fa6cecf8

  • SHA256

    5b7b6ee1f147943bf1c6ca70116662983af26030b8538920928d9ae3990464f2

  • SHA512

    30bcfde470958bafca4d03253075b7889a9a851bf8aad18aae448c709daf2d8c20a8c209b9de9e2c30ad309adf33e522fb013aba8cb90f59dec660e485eef644

  • SSDEEP

    6144:xpEe+EObra7guy4QAON1+J4UW3To0drkqKeZ7kqKe9:bEev5QAOaJ4U8c

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7090a408680e2b8523f45a8ac12b3e15_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7090a408680e2b8523f45a8ac12b3e15_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1792

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1792-2-0x0000000002110000-0x0000000002116000-memory.dmp

    Filesize

    24KB