Analysis

  • max time kernel
    140s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 20:02

General

  • Target

    17577cc9ab9c611fad8cb1a876259750_JaffaCakes118.exe

  • Size

    294KB

  • MD5

    17577cc9ab9c611fad8cb1a876259750

  • SHA1

    6f8b941dde3936f3c3d1d05911cee8dd8e5a4250

  • SHA256

    0b8b592db66357e3b9c2cbdada093c17ca69defbe8779e4ef791d4071618a01f

  • SHA512

    25715b39cf0b5ff6c916f56807fba23f77eb206409159d0bdd8d8ba8028c7d7557ef22fcab233e7e80a6a46643363be916d19ff37b889d1ce1b57ffba6be1eca

  • SSDEEP

    6144:iB0D4ZiDCC98YgIG9zdFHf2H7nYMDl7K2YyHi0+oSot9V:iaD4ZieSgp/FeH75J7CceoSovV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17577cc9ab9c611fad8cb1a876259750_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\17577cc9ab9c611fad8cb1a876259750_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2544

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2544-0-0x0000000000400000-0x00000000004D6000-memory.dmp

    Filesize

    856KB

  • memory/2544-1-0x0000000000400000-0x00000000004D6000-memory.dmp

    Filesize

    856KB

  • memory/2544-6-0x0000000000400000-0x00000000004D6000-memory.dmp

    Filesize

    856KB