Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 22:07 UTC

General

  • Target

    3228f7ddc5caba7fb94e72920609e104_JaffaCakes118.exe

  • Size

    42KB

  • MD5

    3228f7ddc5caba7fb94e72920609e104

  • SHA1

    4b68a5bf27cc6b09f3e160c457c841317dcaf68e

  • SHA256

    fccf0b4b0a14b02dd081f5b789534f269209704adf0992e68b54a1fe88956dcc

  • SHA512

    eb9c1a4cf756f0694f4f7cb5a2f949da374470dc97ecf73aa194c9051e08cde4fba84b58b29c3dc91959e4e472338e93b7cdcd087ee72679c46b3cd6ec7d4a41

  • SSDEEP

    768:L+Lwgzuy8FESoodJ4P11AuQ2TBrl739Y/09jKA0ix9+/y8Uwv5:Dpyuj4LQ2Vp73Lxxkq8Bv5

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\3228f7ddc5caba7fb94e72920609e104_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3228f7ddc5caba7fb94e72920609e104_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Users\Admin\AppData\Local\Temp\3228f7ddc5caba7fb94e72920609e104_JaffaCakes118.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2676

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1228-22-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/1228-18-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/2624-2-0x0000000000020000-0x0000000000022000-memory.dmp

      Filesize

      8KB

    • memory/2624-1-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2624-9-0x0000000000280000-0x0000000000288000-memory.dmp

      Filesize

      32KB

    • memory/2624-14-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2676-16-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2676-17-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2676-12-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2676-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2676-4-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2676-6-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2676-21-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2676-8-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.