Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 07:22

General

  • Target

    2184699edc0586bf4d99d9ddf60f5cf1_JaffaCakes118.exe

  • Size

    32KB

  • MD5

    2184699edc0586bf4d99d9ddf60f5cf1

  • SHA1

    14a31ef46f7e3ac43c351bd08825c7b69a67ec05

  • SHA256

    0914954fb5d63d71a18b18be32c816e33d3dbe1b339a46afb4057b85391da361

  • SHA512

    11bbdeaf822b27892a12bc21906dab2b432e72e30759e9d7b05db9c2f2a48bbf65752fa31f9d760cfbf61dc61e29290f02dd551d433827813fd173a298f3010a

  • SSDEEP

    384:3pq7xZFcGn+99xMQL/jQ92WglXDKPrIZSfg0dNpo3WBuaJ+8y0E4:5AFcGn+9x1WglzKPGYWa3E4

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2184699edc0586bf4d99d9ddf60f5cf1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2184699edc0586bf4d99d9ddf60f5cf1_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    PID:4936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4936-0-0x00007FF8540E5000-0x00007FF8540E6000-memory.dmp

    Filesize

    4KB

  • memory/4936-1-0x000000001C5A0000-0x000000001CA6E000-memory.dmp

    Filesize

    4.8MB

  • memory/4936-2-0x00007FF853E30000-0x00007FF8547D1000-memory.dmp

    Filesize

    9.6MB

  • memory/4936-3-0x000000001BF20000-0x000000001BFC6000-memory.dmp

    Filesize

    664KB

  • memory/4936-5-0x000000001CCF0000-0x000000001CD8C000-memory.dmp

    Filesize

    624KB

  • memory/4936-6-0x0000000001750000-0x0000000001758000-memory.dmp

    Filesize

    32KB

  • memory/4936-7-0x00007FF853E30000-0x00007FF8547D1000-memory.dmp

    Filesize

    9.6MB

  • memory/4936-8-0x00007FF853E30000-0x00007FF8547D1000-memory.dmp

    Filesize

    9.6MB

  • memory/4936-9-0x00007FF8540E5000-0x00007FF8540E6000-memory.dmp

    Filesize

    4KB