Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 09:56

General

  • Target

    751aef3ce21d896fe7f061c660ad1036_JaffaCakes118.exe

  • Size

    440KB

  • MD5

    751aef3ce21d896fe7f061c660ad1036

  • SHA1

    683b3e25fd1d3d79d6998b8a0b1c3597508dfe10

  • SHA256

    47aa645ae269ff6990ffe0f8d1933ac84123916a04572f0f8546b504a93cbe78

  • SHA512

    6b2e73a300ded4bf6fe720809f717c422802a646c9bb133f4d51ca9873940fb46c02732f2b0fd5ea9ec7ebe6dde87352ff052ec8aedf66e3d16fcd74c8eb2ea0

  • SSDEEP

    12288:JHhftsvpSfCludXukNtI0hslOYlTMLW9l4h19Tzkp:JHySxd+k/hWTl439Te

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\751aef3ce21d896fe7f061c660ad1036_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\751aef3ce21d896fe7f061c660ad1036_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TMSetup.txt

    Filesize

    6KB

    MD5

    79905a1d20ed2028bac8a142a7fa38b9

    SHA1

    10ade49c39e6297b1a0a6f81a1148de0c3e2520f

    SHA256

    02d5caa70231c77cc66e11812449f6c38c4717be24dfb6ed6af6b0a502f4bb57

    SHA512

    ed3623ee132b37ae217f8f0ac0c36688faa678677e3a41b0f64f5c43def8477ed4ccc8aa929044b2e785663261f99fc7773e9f69ae5042fc1a12f553d337356a