Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 08:29

General

  • Target

    0774c1a65a207eb2dcfd6f69f475dd6f_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    0774c1a65a207eb2dcfd6f69f475dd6f

  • SHA1

    c808d6a3002ded2aecea7c06ec1b0fcacfcb541a

  • SHA256

    b17e90dbc92e95f56d53449756cee03dd644a21ddf7d061ae96de15ef277a666

  • SHA512

    faafd3e44d3e7c9e6fe1eae6961f41ab07df402712b239627dc7f7892ca8ccaf5176889d2d6e5f10b3bc9cb4256a6eb4feb15799671c1863f600bc12d9148f8e

  • SSDEEP

    1536:Wjl+2lHKITkBXkHbo/8kbrcJj6XWLAVufIC+wuQ944zU0tTpGybe/n93CZ:O5HKITkBXkHbo/8kbgj6XWLAVugwuQ9X

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0774c1a65a207eb2dcfd6f69f475dd6f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0774c1a65a207eb2dcfd6f69f475dd6f_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1432
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4060 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4052

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\odt\office2016setup.exe-

      Filesize

      5.1MB

      MD5

      46626d8a939a1e68d911a10849b2a1d5

      SHA1

      5c24e4c8294d5b28fca863c66a69023ee918303f

      SHA256

      27ffdbd65ba4cb9abafb28076169c1ebed1b9e3910f06d41b24abbd2eef64344

      SHA512

      ba3557ce517768765e0d3476eac9eb5df8cd16f1e2b2a30e87f1f3f2e8c115dbf8e2913eca4673debf59ee108630260648a25ee9f269ca703468ac0a7d6d8664

    • memory/1432-1571-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-670-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-871-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-1257-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-1375-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-1577-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-1592-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-1669-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-1731-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-1743-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-1750-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1432-1766-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB