Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 08:14

General

  • Target

    2f9b0d26e33cdb8a97fc1a3980c6ca5d_JaffaCakes118.exe

  • Size

    674KB

  • MD5

    2f9b0d26e33cdb8a97fc1a3980c6ca5d

  • SHA1

    ce63a66e4b1ce718ef42367472eefe9f42575138

  • SHA256

    4b973a5dc54f19e73e577470aff01d8e70e780d2f5ee187db8c91e7b980c94f2

  • SHA512

    df06b224fdd2442d3aed3db6a25a6dee1ca771dc354c5ac189f90f39e7bc2a73180de3da6fcc8555a9455780bd23faf734142e6e568b952ff9d039d3ef2e4739

  • SSDEEP

    12288:M4RIuUexGHGUjRMFW9G6nMTQ8Un8M+LVnRvE9Frgn4RmVE5OlnSoOk4IpYex:M4SuUmQGUqWbnyQNn8MGV34gVBlSoOkt

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f9b0d26e33cdb8a97fc1a3980c6ca5d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2f9b0d26e33cdb8a97fc1a3980c6ca5d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2172

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2172-0-0x0000000000400000-0x0000000000579000-memory.dmp

          Filesize

          1.5MB

        • memory/2172-1-0x00000000002C0000-0x00000000002C1000-memory.dmp

          Filesize

          4KB

        • memory/2172-17-0x0000000000400000-0x0000000000579000-memory.dmp

          Filesize

          1.5MB

        • memory/2172-19-0x00000000002C0000-0x00000000002C1000-memory.dmp

          Filesize

          4KB

        • memory/2172-23-0x0000000000400000-0x0000000000579000-memory.dmp

          Filesize

          1.5MB

        • memory/2172-26-0x0000000000400000-0x0000000000579000-memory.dmp

          Filesize

          1.5MB