Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 08:10

General

  • Target

    33ebb61422b235946977bc69e5612bcd_JaffaCakes118.exe

  • Size

    461KB

  • MD5

    33ebb61422b235946977bc69e5612bcd

  • SHA1

    f5ef4b668db4273cc660460c474f7ab83c2eae95

  • SHA256

    334ad2b46fd73c5e4ed645e5080f837a09cabe35033ae6517d9b12a2a8f19fef

  • SHA512

    e555be5ba28d122ebb5edd3fae57611a8cfa902c169f5b3117908d56a75154137405e66ac6774600258f71f565e702f307418d6e75336add9def4ccb9d3c4ceb

  • SSDEEP

    12288:5pBq0aEG7Pl0WbW8JDF7iT64lT3WBE1I/q75oOqYbvH:5pLaEGddW8hYWBE1aqPqYb

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33ebb61422b235946977bc69e5612bcd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\33ebb61422b235946977bc69e5612bcd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\33ebb61422b235946977bc69e5612bcd_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\33ebb61422b235946977bc69e5612bcd_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Users\Admin\AppData\Local\Temp\33ebb61422b235946977bc69e5612bcd_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\33ebb61422b235946977bc69e5612bcd_JaffaCakes118.exe"
        3⤵
          PID:2656

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1976-18-0x0000000000400000-0x0000000000488000-memory.dmp

            Filesize

            544KB

          • memory/1976-1-0x0000000000400000-0x0000000000488000-memory.dmp

            Filesize

            544KB

          • memory/1976-0-0x0000000000400000-0x0000000000488000-memory.dmp

            Filesize

            544KB

          • memory/1976-2-0x0000000000401000-0x0000000000407000-memory.dmp

            Filesize

            24KB

          • memory/1976-16-0x0000000002570000-0x00000000025F8000-memory.dmp

            Filesize

            544KB

          • memory/2636-7-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/2636-17-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/2636-13-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/2636-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2636-9-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/2636-5-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/2636-22-0x0000000000460000-0x00000000005E1000-memory.dmp

            Filesize

            1.5MB

          • memory/2636-26-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/2656-21-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/2656-27-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/2656-24-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB