Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 17:04

General

  • Target

    313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe

  • Size

    104KB

  • MD5

    313cd4d2b406d9a71804238f6e8bafbd

  • SHA1

    20dd5390076409b55f1eb59da7cce83d7fbbf849

  • SHA256

    ab4866124d555f988e03f4385ee60fe984fac77e71f24ab2ab985f94ced2bb4e

  • SHA512

    52cb336ddc3ffde206f1a27afe31c3e7c10ce8792ed5407800c659aad5a747212dfe24cd37a2dca830d3a2134b93a161c5c09e4b2fc7fea1cc0dd285d9700ee1

  • SSDEEP

    1536:go67yQgnYztnwkURbiPBrRif7K4cmR3H9hYMp7YewLlr8potg9CXjdpnC6ZRrqk:goD1Y9LURU9YT3c+3dh/8DG6Ycdgy

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\313cd4d2b406d9a71804238f6e8bafbd_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:1732

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\h44c8\tmp.exe

          Filesize

          100KB

          MD5

          77391ab194f01aa24a355f32312c7b17

          SHA1

          ea65e6db38a68ae0d75b2ba9fb98d6c084218bbb

          SHA256

          f704342daa10370f984e6df9c037bbbb9721ca41a4f31b2e006135f0f308343e

          SHA512

          8f02cecf05b767258ed83cdff25afebe433884ee8b58545ecca7f2bb8d111dfe9733397d6505ea19f3efaf7e5b06609688085b41770378c3e16b5dcc2e49e466