Analysis

  • max time kernel
    141s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 00:18

General

  • Target

    3b49ce56f712cb96823277389cd14419_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    3b49ce56f712cb96823277389cd14419

  • SHA1

    83d759fb3d8039dcf30b421be01a507a84b4ea0b

  • SHA256

    e141dbccdaa0e409a869ab8756df5ce56f82210a1e9b8db9b88c11a26ad077ae

  • SHA512

    45579e993a28cc234c9dfc1248295669279983226f71d8ccab7cd2da91f1b38792ea96e144b11cb19c8d4d35d3e1fb37cefa736156406d48e9535c4c6490783a

  • SSDEEP

    49152:LVKaRxF+M0hemjjCSbdEfkl8JT/2Wcqxi3AAP7DnjZNyeh:LVX04QTbdIfJ72agAAP77Zh

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b49ce56f712cb96823277389cd14419_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3b49ce56f712cb96823277389cd14419_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4840

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4840-0-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB