Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 14:52

General

  • Target

    4225ba3915c787a17f9245dd57ef22ca_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    4225ba3915c787a17f9245dd57ef22ca

  • SHA1

    6e4f1b8c94fbe9a61e8c679055211cc6cd846c42

  • SHA256

    38916203af350e921b276dc7039ba655bc9858daaeffcfbb923794767ea959a6

  • SHA512

    875969af87c12d023e1d974338c40aedbc34ad94d7ac82abcc3c380c711a9842b3439ed6c62575ddb35dff13b004a586af07cdf2310585df6030c1345bdacec2

  • SSDEEP

    1536:hXpB5B6Sq1lpsvQRMIxo/aMtpSPOlXt+QZPgIUqyTVZ+inDGFbXFWgpuN:HBH6JavQuaMKW/25qyTzR+8ggN

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4225ba3915c787a17f9245dd57ef22ca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4225ba3915c787a17f9245dd57ef22ca_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:2120

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\v32\tmp.exe

          Filesize

          104KB

          MD5

          1dd928e17cc9c9489ab4b5df6cba6576

          SHA1

          4c2610f9d4a94ae6d1ccfb5dcc6bd8aff41e4bce

          SHA256

          2be646e50d94b38213c5f513a4f2e74a584b6669048b565a52cafd297a95c3a6

          SHA512

          d5afe621c57ec9f026835975f9e25a942e8d73280b7aaac2352815f0499376005b433a406af8c9d52962da95a47fd407fc0aaab281c6654980307cc9dbd4bb0f