Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2024 07:35

General

  • Target

    a473acd514a850165712078ec49ba3b4_JaffaCakes118.exe

  • Size

    373KB

  • MD5

    a473acd514a850165712078ec49ba3b4

  • SHA1

    45bda2f9f957dbb0da9a06f934facd9d17fb8f86

  • SHA256

    9f67cea814388754884dfa2778d0169136da473091ab3285b9f9ca444d5cc59e

  • SHA512

    03c5e20d9e9ba6d21e871a6e2f51ef3043e002656dbf50c6904c4908ae88fd4ae4901c282a3548f8f930f2bc0958c457de544a707f1f830cd1bd0a404bac051a

  • SSDEEP

    6144:SGkORa/mgnQXgZG9PvK6pu4Dx0DrQlqK3BvN+Vz1dbroBjQmafsQQRwbreMnnYJ:WOmmgnQb9K6pVD+QEK3BvN+mjQmafsQE

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a473acd514a850165712078ec49ba3b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a473acd514a850165712078ec49ba3b4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sad6BE9.tmp

    Filesize

    267KB

    MD5

    50d7a4da5f1a4f2999b0178ccec1320d

    SHA1

    443d543e7b8ffec0b84768728d38d8c285ec615f

    SHA256

    28e40d56758faad7a04678a6a2628a10eaa8df9f63f49460a65d539262453245

    SHA512

    0cdcb9e47db9e7c073381161386e9fddb19ab7848d456cbe26ab5ede44fd6ae04aab25c6dc438c458861651f1238e8ccb9976484c4d5e919cb25a5d52c165d7d

  • memory/3312-7-0x0000000006E50000-0x0000000006E5A000-memory.dmp

    Filesize

    40KB

  • memory/3312-3-0x0000000000DC0000-0x0000000000E08000-memory.dmp

    Filesize

    288KB

  • memory/3312-4-0x0000000074EA0000-0x0000000075650000-memory.dmp

    Filesize

    7.7MB

  • memory/3312-5-0x0000000007420000-0x00000000079C4000-memory.dmp

    Filesize

    5.6MB

  • memory/3312-6-0x0000000006E70000-0x0000000006F02000-memory.dmp

    Filesize

    584KB

  • memory/3312-0-0x0000000074EAE000-0x0000000074EAF000-memory.dmp

    Filesize

    4KB

  • memory/3312-8-0x0000000074EA0000-0x0000000075650000-memory.dmp

    Filesize

    7.7MB

  • memory/3312-9-0x0000000074EA0000-0x0000000075650000-memory.dmp

    Filesize

    7.7MB

  • memory/3312-10-0x000000000A140000-0x000000000A1A6000-memory.dmp

    Filesize

    408KB

  • memory/3312-11-0x0000000074EA0000-0x0000000075650000-memory.dmp

    Filesize

    7.7MB

  • memory/3312-20-0x000000000C560000-0x000000000CD06000-memory.dmp

    Filesize

    7.6MB

  • memory/3312-21-0x0000000074EAE000-0x0000000074EAF000-memory.dmp

    Filesize

    4KB

  • memory/3312-22-0x0000000074EA0000-0x0000000075650000-memory.dmp

    Filesize

    7.7MB