Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 22:46

General

  • Target

    2e1997ee47a216548a0ed230312ea7ba_JaffaCakes118.exe

  • Size

    31KB

  • MD5

    2e1997ee47a216548a0ed230312ea7ba

  • SHA1

    267144a101246b8bfd81b3a42bae2cb88bd3fbf8

  • SHA256

    1f73540ac22e8c6bbd0ee3bc4420f4eb5f54e608a245e0ebdd5146ff87ceb1d1

  • SHA512

    0793de2f844b4d95595b856c1779a568b260b56b304e6ba6573941e6e195741c3ae37d8b6a686463e5093e801ef0d92314e977bb68f394be8fbde0d5d6d2c333

  • SSDEEP

    384:qa9+ECGOuOQ9oSuXk0WJFiyozmgtJLMw2aVuymF6xjc6xrP84V1CVfTGQ7:iRba0WJs/CaZluP+VxQ4krR

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e1997ee47a216548a0ed230312ea7ba_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2e1997ee47a216548a0ed230312ea7ba_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    PID:2304

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\Common Files\Microsoft Shared\MSInfo\xiaran.vxd

          Filesize

          17KB

          MD5

          4583f5186671bfa092140d1d49d062f3

          SHA1

          10ae22435eb3df51f390417a40c649a4f28a895b

          SHA256

          d9ee4d9a619edb258fcaf2a265e1bf07303132d7a56e590de73e5be5ddf62744

          SHA512

          9fabeb3ded1ed1de5b12c4c56bfefb6c1e6104c64352905696e6a7dfc9211c23e587f8b4ba6894b69984c0b303753c19da72c3d7573f3f70a7c3d328be5c0b5f

        • memory/2304-1-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2304-0-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2304-2-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2304-8-0x0000000000220000-0x0000000000234000-memory.dmp

          Filesize

          80KB

        • memory/2304-9-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2304-10-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2304-12-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2304-11-0x0000000000220000-0x0000000000234000-memory.dmp

          Filesize

          80KB