Analysis

  • max time kernel
    140s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 11:43

General

  • Target

    3493ba72e025f5b6d332933b43bde1bb_JaffaCakes118.exe

  • Size

    538KB

  • MD5

    3493ba72e025f5b6d332933b43bde1bb

  • SHA1

    6a5977df016c0c6d0878b9a5d138639b9f55d1f8

  • SHA256

    bf155df1c7c996b465f2937aabe336e938d1e042ca721b7f2ed395935a339911

  • SHA512

    f0b3043a6cd781fe0c6aa81f68fc9bded63184087f9686d279af5ae4f023ef4c7dc856fdc94489264261ac145814b95aee8e0cafb1424a56a888bfc7b01ec20f

  • SSDEEP

    12288:MyvyRtE1gfMxJtQGbm2icG2TbNh58lUI5gtXmHpDmqABbvr/:MsyRtEaGvQcbalUIPpYBbvj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3493ba72e025f5b6d332933b43bde1bb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3493ba72e025f5b6d332933b43bde1bb_JaffaCakes118.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\osxp.ini

    Filesize

    8KB

    MD5

    ec65d82622017795fcbd24c9f700c7f6

    SHA1

    ca7fee811c6307a631084e45f2fbc438603369c3

    SHA256

    e5e379d69f6510e8bf0d1bd3983d3a2305ccac74e8e2e64ddab525c1eef9306f

    SHA512

    1b6430101c68593375fc0b2512fcf1b9991e2bd5f88cb3fcba251c24f38a10a7b99145b4c662dc0269556fc7aa19530d3046286c518fa2ef37c97bde2974a78a

  • memory/1068-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1068-0-0x0000000000400000-0x0000000000504000-memory.dmp

    Filesize

    1.0MB

  • memory/1068-437-0x0000000000400000-0x0000000000504000-memory.dmp

    Filesize

    1.0MB

  • memory/1068-439-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB