Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 09:59

General

  • Target

    4554837a5b60bc3566de2750ab0fd4c6_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    4554837a5b60bc3566de2750ab0fd4c6

  • SHA1

    72606778e580c43f672d061cf3b1218cf12a7300

  • SHA256

    c38319ece0f71e8eb3fb32c7204d2d846ce622fb9ccc30d43c69d94e6bef49e9

  • SHA512

    df65efe1cc76e606f200f3ea4878eadbe09cc5b2f0f2508cc7116e3c7074e34c51ac19f7964ca649ba7eecc57d01a549658479fe3baa95664222b5ed6b306107

  • SSDEEP

    24576:5naych01vV4YggXcB31HQyU2GLRytmN8bwIlGQJxkTC:5afu1vmYxsdQyUl+48bD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4554837a5b60bc3566de2750ab0fd4c6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4554837a5b60bc3566de2750ab0fd4c6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Users\Admin\AppData\Local\Temp\is-DDNBM.tmp\4554837a5b60bc3566de2750ab0fd4c6_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-DDNBM.tmp\4554837a5b60bc3566de2750ab0fd4c6_JaffaCakes118.tmp" /SL5="$801D0,886517,54272,C:\Users\Admin\AppData\Local\Temp\4554837a5b60bc3566de2750ab0fd4c6_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      PID:4684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-DDNBM.tmp\4554837a5b60bc3566de2750ab0fd4c6_JaffaCakes118.tmp

    Filesize

    688KB

    MD5

    67c5a4f36e1c91a3b85e440edd7ad026

    SHA1

    e49ea0e558ed682498cc61b3070e4c402fbf0912

    SHA256

    99c299d6565ab53d9af66e0146737dc0ecfbc52ecf4740825b552db0cc4210c6

    SHA512

    40522d4645ece0db9888ea40d1a11356aa5efc191184a0b97cb54a6c243532b1fc306e9095bbfa1f5dc02c8e52b709650230d1383532136e56caea3dc19a973e

  • memory/3772-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3772-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/3772-13-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4684-7-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4684-14-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB