Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 06:57

General

  • Target

    1932b49388d7d6ab720f8ecf582cc892_JaffaCakes118.exe

  • Size

    6.5MB

  • MD5

    1932b49388d7d6ab720f8ecf582cc892

  • SHA1

    c984fedc3769a247cc6e60a177b91d7729e03a2d

  • SHA256

    ce1fbea13268877aa05be11fa5b4c9995a1eefcc7e6580e6588e1eef8b016205

  • SHA512

    b031d8589fca135358bb7f63fba3698dfbf358f9cce2d077e33411b95621b16fec4a1d30c2d7a947532836a1fd1f3051f304a8a3f8a8199ea66e8526b240fcf9

  • SSDEEP

    196608:St29bbc1RCWUMr4U7vfanM0Ul3SuGMpLR:pbQDCWw6f1SuhxR

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1932b49388d7d6ab720f8ecf582cc892_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1932b49388d7d6ab720f8ecf582cc892_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Users\Admin\AppData\Local\Temp\1932b49388d7d6ab720f8ecf582cc892_JaffaCakes118.exe
      wof -artpath . -rompath C:\Users\Admin\AppData\Local\Temp\ -hiscore_directory . -state_directory . -memcard_directory . -nvram_directory . -cfg_directory . -aspect 3:2 -resolution 640x480 -video d3d -switchres -nofilter -skip_gameinfo -triplebuffer -waitvsync -effect Scanlines -scale_effect supereagle
      2⤵
        PID:4600

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4600-7-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/4600-10-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/4600-9-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/4600-6-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/4600-5-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/4872-2-0x0000000000400000-0x0000000000AA4000-memory.dmp

      Filesize

      6.6MB

    • memory/4872-3-0x0000000000401000-0x000000000042D000-memory.dmp

      Filesize

      176KB

    • memory/4872-14-0x0000000000400000-0x0000000000AA4000-memory.dmp

      Filesize

      6.6MB

    • memory/4872-16-0x0000000000400000-0x0000000000AA4000-memory.dmp

      Filesize

      6.6MB