Analysis

  • max time kernel
    97s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 08:34

General

  • Target

    451026a946dd4e417f3dd4d58d40c2ef_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    451026a946dd4e417f3dd4d58d40c2ef

  • SHA1

    9eea667ae9ccc93eef975f683f1aff63d9301685

  • SHA256

    576395f90746943338db3b71726710a56de577d24e7f661fb8d10e6f5b5d05a2

  • SHA512

    5393baa0784a491f0ee96cfe6a2132e1ed067b7c992858399841f56e010e9ce64243fdada7567b8fc4f91b12e7e32fd04e36d15e39344b4849cb4727583e01d0

  • SSDEEP

    1536:EpDojcIKjZ4ZbPdfzlNfYIzunrtgDTQU7B6CD6XyC78wpWd:wDRfGlF7zuxgDBBTjCQw

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\451026a946dd4e417f3dd4d58d40c2ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\451026a946dd4e417f3dd4d58d40c2ef_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe
      2⤵
        PID:1112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 12
          3⤵
          • Program crash
          PID:1744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1112 -ip 1112
      1⤵
        PID:912

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1112-7-0x0000000000400000-0x0000000000419000-memory.dmp

              Filesize

              100KB

            • memory/2424-0-0x0000000000400000-0x0000000000419000-memory.dmp

              Filesize

              100KB

            • memory/2424-10-0x0000000000400000-0x0000000000419000-memory.dmp

              Filesize

              100KB