Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2024 23:19

General

  • Target

    2732c6d303768ff5bb188e6e52b5b679_JaffaCakes118.exe

  • Size

    631KB

  • MD5

    2732c6d303768ff5bb188e6e52b5b679

  • SHA1

    a94aa48d62a9b7b8e4ba9045f0d96f1d4a1ca879

  • SHA256

    73661f4b3bae94046cf814d9475f137b64d5f84e2a3e31a62d0fec9015c32efa

  • SHA512

    6157a15b6aa80789e772f86c2731a19e7093f82d7076931cb43b70268fc04950443fa27ea0a53f5c5253affb6538d2ddcaf011fd349ef70d4e05ccf18a527c2d

  • SSDEEP

    12288:7NoFmw6FvnRuzg/axX7JY+eSUSuuFi4A547+8pVpDckHxYfplb:7Nlw8vnRuzg/axLJY+cSJFi4ACy8pVpE

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2732c6d303768ff5bb188e6e52b5b679_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2732c6d303768ff5bb188e6e52b5b679_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

    Filesize

    576B

    MD5

    6276a9b4ae68ad3f1e0b8d2eb9ad1b0c

    SHA1

    a61541eff2c53445f1fae6586f7d410a24dfab54

    SHA256

    de518dd47e973841c456dd50525896be7056167577d51d918734d77de7d40c1f

    SHA512

    60f714d36b27572f2f1200abed9d987a59e0a38ee9edee8a34a26e2e79641555ce9702246a3227c5cb111d1ddb82719c67d4cb07f9945d3f0d645cec592555d7