Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 12:13

General

  • Target

    225ca54b6700678ae97b15626910ea0d_JaffaCakes118.exe

  • Size

    221KB

  • MD5

    225ca54b6700678ae97b15626910ea0d

  • SHA1

    cb6668c7217e55b05a716621224dec4025b29d41

  • SHA256

    2fd04fbcc89a0e63c48da1c1505475dd9b288fd19a878e840948546610eac1b9

  • SHA512

    a4e8591313bb22f5608a03869e9388f36d3ed04834a45b38227a047f731c7a5980e21c561158ae6ab62feb6b6b01255ce8c4c92c7b4f446b7897931272a349f7

  • SSDEEP

    3072:Z/3+NU6lIM1i7Smp0xIEMVu/lNghxglBHS3+R0hKyd4j+VF8O3pBIK0j7AtrakNn:Z/3+yp0qDalNF1GKcLPplA7Sra6Bsm/

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\225ca54b6700678ae97b15626910ea0d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\225ca54b6700678ae97b15626910ea0d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\225ca54b6700678ae97b15626910ea0d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\225ca54b6700678ae97b15626910ea0d_JaffaCakes118.exe
      2⤵
        PID:1212

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1212-13-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1212-6-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1212-16-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/1212-3-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1212-10-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1212-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1212-15-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB

    • memory/1212-11-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB

    • memory/1212-5-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2880-0-0x00000000745C1000-0x00000000745C2000-memory.dmp

      Filesize

      4KB

    • memory/2880-14-0x00000000745C0000-0x0000000074B6B000-memory.dmp

      Filesize

      5.7MB

    • memory/2880-1-0x00000000745C0000-0x0000000074B6B000-memory.dmp

      Filesize

      5.7MB

    • memory/2880-2-0x00000000745C0000-0x0000000074B6B000-memory.dmp

      Filesize

      5.7MB

    • memory/2880-17-0x00000000745C0000-0x0000000074B6B000-memory.dmp

      Filesize

      5.7MB

    • memory/2880-18-0x00000000745C0000-0x0000000074B6B000-memory.dmp

      Filesize

      5.7MB