Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 00:06

General

  • Target

    328abe98b30b9fa8bdc447401d2d4ed1_JaffaCakes118.exe

  • Size

    628KB

  • MD5

    328abe98b30b9fa8bdc447401d2d4ed1

  • SHA1

    e8fa3ac496a0ed6094fe64ac33e720398a019c5a

  • SHA256

    9265294de83a6a1e2548b686d58e41e74c2abfb89f7b953c79b65881f704794e

  • SHA512

    d2dbee4ec67a3a9999448d6ef79a9d4c97bc04a0b700bb3666d9c6e665007017429a5c7c67bdd1964047f874d5569fa342406e59b10dc4414c3e7e08f3ff7286

  • SSDEEP

    12288:D5ZSqDvQgAl6HKEp6t7JYKF4cSHY6THyH1nI9ESWmtley8psw:D5ZVvDAl6HKEp69JYi49Y6THyVI9ESWh

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\328abe98b30b9fa8bdc447401d2d4ed1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\328abe98b30b9fa8bdc447401d2d4ed1_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2284

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\offconfig.temp

    Filesize

    597B

    MD5

    a710d6293202caab004e4a9c482497f1

    SHA1

    7d1054a9e44bcfd3c3aafb7b3db10978201bb655

    SHA256

    b9b7e56c40766b9f5fc0da312fd57d2f8f20ed19d8441547300829be8354ed9a

    SHA512

    ed67d670996ee50e619e82a7e98ad1c7e208631c090e1c3314d8ca88d58728707d301270a1a6d4691a2da2baf25d5ae439002f42ceddc692480bdd57b1a247f7