Analysis

  • max time kernel
    140s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 11:32

General

  • Target

    1b21b8b207a66e0ea328d625631db1dc_JaffaCakes118.exe

  • Size

    256KB

  • MD5

    1b21b8b207a66e0ea328d625631db1dc

  • SHA1

    6b05d11a924b28950a1fab470dd0186c854e2332

  • SHA256

    3f27a9707e2007af48a08ff38d820626d04511cac0c59903b433fcc22fa47e4d

  • SHA512

    92abed88076470b57b8bfd2666b44e8e75ddaa869489367aab4e4c08df1e3c969b65f5b968f292f8ca3bcc02611d056bee50413eb7307f86dc7a261cc873348d

  • SSDEEP

    6144:76vI8yP6E1hU+2Edr2+y0zbKX3ir6fhzo0naGRZ5:mvBySEsHEdr2NioPaGRT

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b21b8b207a66e0ea328d625631db1dc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1b21b8b207a66e0ea328d625631db1dc_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:4048
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3752 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4948

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\vcmgcd32.dll

      Filesize

      36KB

      MD5

      ae22ca9f11ade8e362254b452cc07f78

      SHA1

      4b3cb548c547d3be76e571e0579a609969b05975

      SHA256

      20cbcc9d1e6bd3c7ccacbe81fd26551b2ccfc02c00e8f948b9e9016c8b401db6

      SHA512

      9e1c725758a284ec9132f393a0b27b019a7dde32dc0649b468152876b1c77b195abc9689b732144d8c5b4d0b5fcb960a3074264cab75e6681932d3da2a644bc1

    • memory/4048-0-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4048-5-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/4048-9-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4048-10-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB