Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 13:24

General

  • Target

    08c5632151a06afe5038adc4cc51e04d_JaffaCakes118.exe

  • Size

    39KB

  • MD5

    08c5632151a06afe5038adc4cc51e04d

  • SHA1

    c1e7d18a6dbaceb54ce524868fe4b3087ab352ca

  • SHA256

    d6368e7509be25e8ea4a25d85edc3c984e79604075a7a535d65be150c0d5f382

  • SHA512

    84784884ecf75983c34ecd4628469976bfaff64d36bfb806323f0f0b1263619d53d3e44a0864241dc6153aba3f4b10be7c55687f027dbae81daa1cffc85ed48a

  • SSDEEP

    768:8UfiwHghryEH/qs9be+7nyWXjbantS8YzXBR:8Ufiw+r5C2be+NfYUFrv

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\08c5632151a06afe5038adc4cc51e04d_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\08c5632151a06afe5038adc4cc51e04d_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2368

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1180-2-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/1180-8-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

      Filesize

      24KB

    • memory/2368-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2368-1-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/2368-20-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/2368-21-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB