Analysis

  • max time kernel
    138s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 00:43

General

  • Target

    05d09feb4a8d61b5c2bc8ceb03cfacb8_JaffaCakes118.exe

  • Size

    105KB

  • MD5

    05d09feb4a8d61b5c2bc8ceb03cfacb8

  • SHA1

    f3cc9da78fc6019f4823d478f8d898c0e7c5cc0d

  • SHA256

    9380c726a8dc9cb38a2ff3800847e340f379bc92aada04d36af6d76d24ccc268

  • SHA512

    42de2fe70e1048ef7bdf5d32f39d466318f35bc89eb6a60d9cb31b30cf698284ecca20077ac28c40dab17b76f7965268b0639ada741baa5fe6f233e1fb7cfffb

  • SSDEEP

    1536:IFfFOQkbybyKPEKIPUaIeAwQXIyUDZixqtuvX4fAIz83iy+8Anegpl/4+:I1hkGbyqEK9eAVYFhwf4fAmnegr/4

Score
1/10

Malware Config

Signatures

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05d09feb4a8d61b5c2bc8ceb03cfacb8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\05d09feb4a8d61b5c2bc8ceb03cfacb8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:2352
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4448,i,8998666007764333392,14724298544432336038,262144 --variations-seed-version --mojo-platform-channel-handle=4464 /prefetch:8
      1⤵
        PID:2168

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5032-0-0x00000000005D0000-0x00000000005D1000-memory.dmp

        Filesize

        4KB

      • memory/5032-1-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/5032-3-0x00000000005F0000-0x00000000005FE000-memory.dmp

        Filesize

        56KB