Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 09:55

General

  • Target

    1591408cd5df4e94293623572d393e7b_JaffaCakes118.exe

  • Size

    196KB

  • MD5

    1591408cd5df4e94293623572d393e7b

  • SHA1

    cdba0ada914e51af6db354225a340d7b15c343a9

  • SHA256

    7117d86efb7bdd7bdb78122f70346de00f0a1d66e0e39e65a1545de0316a203f

  • SHA512

    e4747ed9277b4c88bdcbe62c936a63dae44a1ba0d791647360fac329b920fc0cc8ee18b00191b38d5389861fccf77793fd894b7ea3a630de446eb5829f0273cb

  • SSDEEP

    6144:+2Llw9TtyyBG0duV3WW34rBfL1RCaSC0e:43d6s1R3/

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1591408cd5df4e94293623572d393e7b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1591408cd5df4e94293623572d393e7b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 -s C:\Windows\system32\MSINET.OCX
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:4624

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\MSINET.OCX

    Filesize

    112KB

    MD5

    7bec181a21753498b6bd001c42a42722

    SHA1

    3249f233657dc66632c0539c47895bfcee5770cc

    SHA256

    73da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31

    SHA512

    d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc

  • memory/1072-0-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB