Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 04:50

General

  • Target

    18d52644fd480a23c33080fde439af20_JaffaCakes118.exe

  • Size

    358KB

  • MD5

    18d52644fd480a23c33080fde439af20

  • SHA1

    2c3cb4dc538fcc8b4c0106392e9c0f0261a57e66

  • SHA256

    bb83ebe73bba5bb71ca73e60b30c412ebc5c6a84bd54d816b0ce52086b920887

  • SHA512

    34030fba43b21ffa4cb1779e0d636aaf464220c09a7344455d0c3034d254a8683a83b9bde31be328be9d026be2b79b6a7d83cc8d84be0dc744bfa4cb8753beca

  • SSDEEP

    6144:wl8KWs/bWq+nR6xtEstSlckJ4OUSccLU4968TI+RjoSPt:wl837cCHJrccvZPRjoSPt

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18d52644fd480a23c33080fde439af20_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\18d52644fd480a23c33080fde439af20_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\GetRightToGo\18d52644fd480a23c33080fde439af20_JaffaCakes118.data0

    Filesize

    1KB

    MD5

    3ac2fa58bd789ad3a4cce0148ef78d8b

    SHA1

    5febb056eda08ae402e9d1d0aa022d2106619688

    SHA256

    a8d8a76c5d9f3abca4951aad52fe2f3b20255da3a1a8c96ce5e131acd92747f9

    SHA512

    b75963e250cb91211a7c25cb95315115cc4c1b48bdf64fba107ca0bf10bda310664e95ea2e5a28a2bb072bb92283cea413c80006a8772b3eea0c5da3b4f1db17

  • memory/4676-0-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/4676-12-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB