Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 15:10

General

  • Target

    0e86ad1df0166ebc0cf45194185398ec_JaffaCakes118.exe

  • Size

    660KB

  • MD5

    0e86ad1df0166ebc0cf45194185398ec

  • SHA1

    52e699cd8a702be037fafeedd3556da239b7a29a

  • SHA256

    47d833fef41c26d06568b81f9bf52d44066f3df107f039b8c46ad0868193b08f

  • SHA512

    5321fc7c7d3a56ca04ada09dbeed6a3852855184d443c92d28b8f6f38a5b4d5461a69b7104a704985d4573e13d78dca994bac50e51e6c0f2b262dd38f99210b1

  • SSDEEP

    12288:gbVLe5JVoMWked/97cgQLwkH4lkYh+O4P2Rk0:gbVLeXVoB/97LGryT+OCI

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e86ad1df0166ebc0cf45194185398ec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e86ad1df0166ebc0cf45194185398ec_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3004
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4332,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4180 /prefetch:8
    1⤵
      PID:1780

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Downloaded Program Files\pcmedic.ocx

      Filesize

      631KB

      MD5

      c91eca8a281378d557f228900d79da3d

      SHA1

      22852a5ca6c04c56a93d371ccbdbb709a8131cae

      SHA256

      7daf0324a08f73f963954513801158f39f501a31bea71af3f9c6ac1dc2b116f8

      SHA512

      8569fa2e3b1f194be6376e206702f2f9ee0914fadcd5443532541476506ebe5033f5a52b898e4ba4ec7ce6ca489d1be4861fcc2240c5843a38d0ed41a50e75bc

    • memory/3004-0-0x0000000000400000-0x00000000004A5000-memory.dmp

      Filesize

      660KB

    • memory/3004-6-0x0000000002330000-0x00000000023D3000-memory.dmp

      Filesize

      652KB

    • memory/3004-14-0x0000000004200000-0x00000000042A3000-memory.dmp

      Filesize

      652KB

    • memory/3004-17-0x00000000043B0000-0x00000000043B1000-memory.dmp

      Filesize

      4KB

    • memory/3004-18-0x0000000004200000-0x00000000042A3000-memory.dmp

      Filesize

      652KB

    • memory/3004-20-0x0000000000400000-0x00000000004A5000-memory.dmp

      Filesize

      660KB