Analysis

  • max time kernel
    149s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 00:58

General

  • Target

    063a495bbeb578d5e4b37707a1d95bf8_JaffaCakes118.exe

  • Size

    243KB

  • MD5

    063a495bbeb578d5e4b37707a1d95bf8

  • SHA1

    d6ffacb7bf7f9ef509db668bdc7bcf9694ab1c11

  • SHA256

    98ebc72062514e67dc3ebc29dad904a5c4ec0fbfe888d0c7db9a4cc8716a887a

  • SHA512

    6e334ae08f4eb2416cfac220f19ee48376c1fa0031136912b6d916b26dbbbbf04ce31139df8f13968b9392147a96ce9ebb6238f7cd7e59ab1a871bdaa62649b8

  • SSDEEP

    6144:qNFEn9dMaj4U6xyCKgqpglM0Ag1EtMTFhzCKg:qEn9eaJ0V7/hzi

Score
8/10
upx

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\063a495bbeb578d5e4b37707a1d95bf8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\063a495bbeb578d5e4b37707a1d95bf8_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious use of SetWindowsHookEx
    PID:2312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2312-0-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-2-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-3-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-4-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-5-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-6-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-7-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-8-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-9-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-10-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-11-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-12-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-13-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-14-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2312-15-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB