Analysis

  • max time kernel
    134s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 16:04

General

  • Target

    22f8b43bedca547032c6ff54acd0d32c_JaffaCakes118.exe

  • Size

    439KB

  • MD5

    22f8b43bedca547032c6ff54acd0d32c

  • SHA1

    dbd02d11cb075b6ced5f30ec6d875dffff9351b6

  • SHA256

    0b6da120bea63dea6b2d0f9cdc955b7dfb3a32cd19bd437bb9afec2818bf9a75

  • SHA512

    9e7d04394a411a4ca4ae85bdcbd9953fdfab49415ceb31423aaae8d984181014fd08bb69ba590962ee81dac696f00ff705f6684b4ab53152571f770d4615e5cb

  • SSDEEP

    6144:qAt2UChuItoFHSQKIbyzHvXWQZ8gD16NTlK2BSkGZCnbgtgGFajvBGqQ:G04gyQvbyrvxJ6tlrBwoi7EjpG

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22f8b43bedca547032c6ff54acd0d32c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\22f8b43bedca547032c6ff54acd0d32c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Users\Admin\AppData\Local\Temp\22f8b43bedca547032c6ff54acd0d32c_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\22f8b43bedca547032c6ff54acd0d32c_JaffaCakes118.exe
      2⤵
        PID:2692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 532
          3⤵
          • Program crash
          PID:1640
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2692 -ip 2692
      1⤵
        PID:1592

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1064-12-0x0000000000400000-0x0000000000474000-memory.dmp

              Filesize

              464KB

            • memory/2692-5-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-11-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-7-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-9-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-6-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-2-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-4-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-3-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-1-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-8-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-0-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/2692-13-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB