Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 00:29

General

  • Target

    2a58be7700540c9a933a5ca701d9ea27_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    2a58be7700540c9a933a5ca701d9ea27

  • SHA1

    effff654ae0c5b89346e52ede194816005c208e7

  • SHA256

    b3b63e60c0e947d4e8c16c246cdf7fb5864d93ab82f29a3a29dbc3cd7bf680de

  • SHA512

    fb0ebc3f9dcfed1fd838833c618914936845e29bca38cdca88c50cc72840bcdc82cca08dfc4ac9f5daab7aaac676a7571cbe0b8118c42a3ce65050d2f1627c14

  • SSDEEP

    1536:/oh5xOxnSHFVUiX4qpHMmopH53/KCYnLZRiAfLicaKCL/j:Ah5xOxnSHFVh3MmoX3/VMfLiu4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a58be7700540c9a933a5ca701d9ea27_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a58be7700540c9a933a5ca701d9ea27_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4480

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4480-0-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/4480-3-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB