Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 14:22

General

  • Target

    0e664c0d99f425da7cad2573723c0237_JaffaCakes118.exe

  • Size

    51KB

  • MD5

    0e664c0d99f425da7cad2573723c0237

  • SHA1

    1a7d91c123c4f154b5c2bf1a7095737e70494992

  • SHA256

    d30f71dd1bd4362b53e9dd703283f22dddba3e5db52ccf86573934addea2c1cd

  • SHA512

    a657ae1e6ceb6d5dcfb8c263805022be2d83bbc4f71d8ac2cd2f3b526810e2fd1b449d0744e690b5e3362847709967ab9437c5baa6b5ec8c9520349d6b86533f

  • SSDEEP

    768:Cb2XTHJYdQId1JFBD57zEacgetDJcdQId15XTHJhB5E/9nvmC:CqwFhz6g+Ja3BW9vm

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e664c0d99f425da7cad2573723c0237_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e664c0d99f425da7cad2573723c0237_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\0e664c0d99f425da7cad2573723c0237_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\0e664c0d99f425da7cad2573723c0237_JaffaCakes118.exe
      2⤵
        PID:2928

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2928-13-0x0000000000400000-0x0000000000401E00-memory.dmp

      Filesize

      7KB

    • memory/2928-11-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB

    • memory/2928-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2928-7-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB

    • memory/2928-6-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB

    • memory/2928-4-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB

    • memory/2928-2-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB