Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    19/06/2024, 23:21

General

  • Target

    0120a2bbd0ac131b3fdc597705f96269_JaffaCakes118.exe

  • Size

    245KB

  • MD5

    0120a2bbd0ac131b3fdc597705f96269

  • SHA1

    3b16cb38a067796245fc36280c39e8e97decd01c

  • SHA256

    c5ce9788d231460f073ba89dadba7aa4b62e171a608443e1353a98311c208861

  • SHA512

    e2b01a8a216f965d8090e3dfef83ce3a6dc4724d1fb3fe7750e4d2357350d8cd1f126803573b2bcd6427b000249d6cd4f2b2a284702b6705de15e92b8fde4272

  • SSDEEP

    6144:1Dvnl4NlaJ+bW05bvWPTggFYVTgVpdd2+9knLT9sGUXDFV:1qAo5rWrgbVTA

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0120a2bbd0ac131b3fdc597705f96269_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0120a2bbd0ac131b3fdc597705f96269_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 300
      2⤵
      • Program crash
      PID:1648

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2880-0-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2880-2-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2880-1-0x0000000000402000-0x000000000043B000-memory.dmp

          Filesize

          228KB

        • memory/2880-4-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2880-3-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2880-5-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2880-6-0x0000000000402000-0x000000000043B000-memory.dmp

          Filesize

          228KB