Analysis

  • max time kernel
    91s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 02:20

General

  • Target

    37564b7ead95a067235409e1320f4da9_JaffaCakes118.exe

  • Size

    36KB

  • MD5

    37564b7ead95a067235409e1320f4da9

  • SHA1

    55baeb49f360689219efbf1fc887d32ec5adaf84

  • SHA256

    d67783ffa32c26878aff27d2a21f88b02eb048ecd1c760a2e26824188df07cd0

  • SHA512

    b02669836883ab47d8b00695dd55e7b1902244aaa46dc4e56928528c92c343d1a3f510f23996e0d0566440dce60e8cc8b08a1d8aa8f56b614cbabbcebe7ab048

  • SSDEEP

    768:lGCur3Np3eg9kPpnf11rNPTLaRxNTahtTu6hk:lGC+b3eg9Sx5YotT9hk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37564b7ead95a067235409e1320f4da9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\37564b7ead95a067235409e1320f4da9_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\tmp.tmp.tmp1
      C:\Windows\tmp.tmp.tmp1
      2⤵
      • Executes dropped EXE
      PID:5028
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 492
        3⤵
        • Program crash
        PID:4352
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5028 -ip 5028
    1⤵
      PID:1576

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tmp.tmp.tmp1

      Filesize

      8KB

      MD5

      52d4462b34d3b71e81de62b7520e1bd5

      SHA1

      c17fe5819334e7fdeaa7b3899345042189790f79

      SHA256

      7a60debedb9a0b334bb564ca316be3b9ac59cedda5a681f8210552d6ae2bcf57

      SHA512

      949efdf3d8f67b1310a3e8c91025ccda316dea24a5c18a3d767847581e647cda7d70792be68b8cc8c8c9d85ab4959ad8d49fa9d82c86387594aa1dda24a54452

    • memory/2084-0-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/2084-10-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/5028-9-0x0000000000400000-0x0000000000402200-memory.dmp

      Filesize

      8KB