Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 19:17

General

  • Target

    25f36db7e194478dd49991ecd24824de_JaffaCakes118.exe

  • Size

    265KB

  • MD5

    25f36db7e194478dd49991ecd24824de

  • SHA1

    40b76e9ef3c4d75967371fe997044d9ce7a29d8a

  • SHA256

    9ce19fd78ef09aed1ac85c45004a5f05207ae06c762755a6b68a74d3c5f4e605

  • SHA512

    57b78091782aca8aef234301cdb1dd1a1bbcf27008a019a13cb7f38d0f9429a58787157686584760725b556c3007aaef9069de4f5ecbba050337655f3c548846

  • SSDEEP

    6144:jlZIdFDRr6s6dWunLM9xTO9fTpeeOkuQUjIm75thxPubUJGa17H:jIdFDRrVgLM9dkVSrIm7vhx2cH

Score
1/10

Malware Config

Signatures

  • Modifies registry class 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25f36db7e194478dd49991ecd24824de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\25f36db7e194478dd49991ecd24824de_JaffaCakes118.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1700

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1700-0-0x0000000000400000-0x00000000005F9000-memory.dmp

    Filesize

    2.0MB

  • memory/1700-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1700-3-0x00000000007A0000-0x00000000007B5000-memory.dmp

    Filesize

    84KB

  • memory/1700-6-0x00000000007A0000-0x00000000007B8000-memory.dmp

    Filesize

    96KB

  • memory/1700-9-0x00000000007A0000-0x00000000007B2000-memory.dmp

    Filesize

    72KB

  • memory/1700-8-0x00000000007A0000-0x00000000007B2000-memory.dmp

    Filesize

    72KB

  • memory/1700-7-0x00000000007A0000-0x00000000007B8000-memory.dmp

    Filesize

    96KB

  • memory/1700-5-0x0000000003560000-0x0000000003606000-memory.dmp

    Filesize

    664KB

  • memory/1700-4-0x0000000003560000-0x0000000003606000-memory.dmp

    Filesize

    664KB

  • memory/1700-10-0x0000000000400000-0x00000000005F9000-memory.dmp

    Filesize

    2.0MB

  • memory/1700-11-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1700-13-0x00000000007A0000-0x00000000007B5000-memory.dmp

    Filesize

    84KB

  • memory/1700-12-0x00000000007A0000-0x00000000007B5000-memory.dmp

    Filesize

    84KB

  • memory/1700-17-0x00000000007A0000-0x00000000007B2000-memory.dmp

    Filesize

    72KB

  • memory/1700-16-0x00000000007A0000-0x00000000007B8000-memory.dmp

    Filesize

    96KB

  • memory/1700-15-0x00000000007A0000-0x00000000007B8000-memory.dmp

    Filesize

    96KB

  • memory/1700-14-0x0000000003560000-0x0000000003606000-memory.dmp

    Filesize

    664KB

  • memory/1700-18-0x00000000007A0000-0x00000000007B2000-memory.dmp

    Filesize

    72KB